THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

Similar documents
TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I.

INFORMATION SYSTEMS AUDITOR EXAM PREPARATION COURSE NICOSIA LIVE ON-LINE. 1 P a g e

COURSE BROCHURE CISA TRAINING

CISA Training.

Certified Information Security Manager (CISM) Course Overview

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

BRING EXPERT TRAINING TO YOUR WORKPLACE.

building for my Future 2013 Certification

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar

Certified information Systems Security Professional(CISSP) Bootcamp

CISA EXAM PREPARATION - Weekend Program

Security Program Design:

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I.

CISM QAE ITEM DEVELOPMENT GUIDE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Assurance through the ISO27002 Standard and the US NIST Cybersecurity Framework. Keith Price Principal Consultant

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013. Visit us online at Flank.org to learn more.

CompTIA Security+ Study Guide (SY0-501)

Cybersecurity Auditing in an Unsecure World

Mohammad Shahadat Hossain

Appendix A. Syllabus. NIST Cybersecurity Foundation. Syllabus. Status: First Draft

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

Certified in the Governance of Enterprise IT Training - Brochure

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

Predstavenie štandardu ISO/IEC 27005

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification

Certified in Risk and Information Systems ControlTM Certification Training - Brochure

Article II - Standards Section V - Continuing Education Requirements

Certified Information Systems Auditor (CISA)

Training + Information Sharing: Pillars of enhancing cybersecurity posture

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC

Mapping PCI DSS v2.0 With COBIT 4.1 By Pritam Bankar, CISA, CISM, and Sharad Verma

Les joies et les peines de la transformation numérique

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

CISM ITEM DEVELOPMENT GUIDE

CISA ITEM DEVELOPMENT GUIDE

Healthcare Security Success Story

Altius IT Policy Collection Compliance and Standards Matrix

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Building a strong platform strategy: IT and cybersecurity implications November 15, 2018

John Snare Chair Standards Australia Committee IT/12/4

Course Outline. CISSP - Certified Information Systems Security Professional

Altius IT Policy Collection Compliance and Standards Matrix

Bonnie A. Goins Adjunct Industry Professor Illinois Institute of Technology

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

INFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES. forebrook

CISM Certified Information Security Manager

Certified Information Systems Auditor Training and Certification

Fill in the attached registration Form and send to fax number or at

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

Altius IT Policy Collection

NW NATURAL CYBER SECURITY 2016.JUNE.16

TEL2813/IS2820 Security Management

Position Description IT Auditor

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA

Ingram Micro Cyber Security Portfolio

Top Business/Technology Issues Survey 2011

Cyber Security Program

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0

Application for Certification

ISO 55001: 2014 Asset Management System 5-Day Training Course (IAM Certified)

ISACA International Perspective

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

ISACA. Certification Details for Certified in the Governance of Enterprise IT (CGEIT )

The importance of STANDARDS to ensure ACCOUNTABILITY and GOVERNANCE in ehealth-ict security processes

Threat and Vulnerability Assessment Tool

ISE Canada Executive Forum and Awards

Green Governance Growth

Introduction to ISO/IEC 27001:2005

Certified Cyber Security Specialist

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

CCISO Blueprint v1. EC-Council

FDIC InTREx What Documentation Are You Expected to Have?

Vulnerability Assessments and Penetration Testing

Manchester Metropolitan University Information Security Strategy

CYBERSECURITY: E-COMMERCE, GOVERNANCE AND APPLIED CERTIFICATIONS A ROUNDTABLE DISCUSSION 15 DECEMBER 2015

Rethinking Information Security Risk Management CRM002

Information Security Policy

ITG. Information Security Management System Manual

ISO & ISO & ISO Cloud Documentation Toolkit

Next Generation Policy & Compliance

Security Management Models And Practices Feb 5, 2008

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

2018 CALENDAR OF ACTIVITIES

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Gujarat Forensic Sciences University

Business Context: Key for Successful Risk Management

Integration Technologies Group, Inc. Uncompromising Performance

แนวทางการพ ฒนา Information Security Professional ในประเทศไทย

The NIST Cybersecurity Framework

IoT & SCADA Cyber Security Services

GRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

David Fletcher Co-Principal Investigator Western Management & Consulting LLC Albuquerque, NM

Transcription:

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION SYSTEMS AUDIT 1 ½ DAYS o INFORMATION SECURITY MANAGEMENT ½ DAY RISK, INFORMATION SYSTEM CONTROL AND GOVERNANCE OF IT (2 DAYS) MAY 17 AND 18 o RISK AND INFORMATION SYSTEM CONTROL 1 ½ DAYS o GOVERNANCE OF ENTERPRISE IT ½ DAY REGISTRATION AND PAYMENT EARLY BIRD: REGISTRATION AND PAYMENT BEFORE APRIL 12: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) USD 300 RISK, INFORMATION SYSTEM CONTROL AND GOVERNANCE OF IT (2 DAYS) USD 300 BOTH SESSIONS USD 500 LATE AFTER APRIL 12 : REGISTRATION AND PAYMENT: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) USD 450 RISK, INFORMATION SYSTEM CONTROL AND GOVERNANCE ( 2 DAYS) USD 450 BOTH SESSIONS USD 800 AUDIENCE: The training sessions are intended for internal audit & external audit, bank/insurance company examination professionals; Information Security practitioners and Information Technology persons who need to and/or are interested in enhancing job related competencies in information technology risk, audit and control areas. Page 1 of 6

SESSION DESCRIPTIONS: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) INFORMATION SYSTEMS AUDIT (1 ½ DAYS) CPE Hours: 12 This session will provide detailed discussion on information technology audit areas. We will focus on key risk and control areas relating to information systems and supporting technology infrastructure within the enterprise. Understand risk-based approach to IT Audits Understand how to audit key IT Governance areas Understand key controls in Information System development and acquisition projects Understand key controls in IT Operations and Service Management areas Understand key information security controls Topics Covered include: Auditing Information Systems Risk-based IS audit strategy / Audit Planning IS audit standards Evaluation of Governance and Management of IT IT strategy / IT governance structure / IT organizational structure IT policies, standards and procedures Evaluation of Information Systems Acquisition, Development and Implementation Project management framework and controls / Project Planning Controls for information systems during acquisition, development phases Evaluation of Information Systems Operations, Maintenance and Service Management IT operations (e.g., job scheduling, configuration management, capacity and performance management) / IT maintenance (patches, upgrades) Problem and incident management / Change and release management practices IT continuity and resilience (backups/restores, disaster recovery plan) Page 2 of 6

Evaluate Protection of Information Assets Information security and privacy policies, standards and procedures Physical and environmental controls System and logical security controls INFORMATION SECURITY MANAGEMENT - ½ DAY CPE Hours: 4 This session will provide high level discussion on key information security areas. We will focus on key processes to manage governance, risk and compliance areas relating to information security within the enterprise Understand key information security governance requirements and practices Understand information security risks and processes to identify and manage risk within the organization Topics Covered: Information Security Governance Information security strategy Information security governance framework Information security policy framework Information Risk Management and Compliance Risk assessments /Risk treatment options Risk monitoring / Risk reporting Information Security Program Development and Management Information security program development / management Information Security Incident Management Security incident response Page 3 of 6

RISK, INFORMATION SYSTEM CONTROL AND GOVERNANCE OF IT (2 DAYS) RISK AND INFORMATION SYSTEM CONTROL -1 ½ DAYS CPE Hours: 12 This session will provide detailed discussion on key risk management and information system control areas. Understand risk governance and management areas Understand information security risks and processes to identify and manage risk within the organization Understand key risk mitigation strategies Understand key controls to mitigate risks to acceptable levels Topics Covered: Risk Management and Information Systems Control Key risk management concepts, Threats and vulnerabilities Risk identification, classification, assessment and evaluation techniques Risk scenario development tools and techniques Risk awareness training tools and techniques Risk Response Risk response selection Exception management Cost-benefit analysis / Business case Risk Monitoring Risk and compliance reporting requirements, tools and techniques Risk assessment methodologies Information Systems Control Design and Implementation Control categories Page 4 of 6

Information Systems Control Maintenance and Monitoring Monitoring tools and techniques Testing and assessment tools and techniques Control maintenance GOVERNANCE OF ENTERPRISE IT ½ DAY CPE Hours: 4 This session will provide discussion on key information technology governance areas. Understand key IT governance concepts and frameworks Understand IT Strategic Planning processes Understand IT Investment Management Understand IT Risk Management Understand IT Resource Management Topics Covered: Framework for the Governance of Enterprise IT Framework for the governance of enterprise IT Roles, responsibilities and accountabilities Strategic Management IT strategic planning processes Benefits Realization IT investment management practices Risk Optimization IT risk management processes Resource Optimization IT resource management Page 5 of 6

https://www.linkedin.com/in/john-tannahill-9302a72 Instructor Profile : John Tannahill, CA, CISM, CGEIT, CRISC is a management consultant specializing in information security and audit services. His current focus is on cybersecurity and control in large information systems environments and networks. Specific areas of technical expertise include UNIX and Windows operating system security, network security, and database security. John is a frequent speaker in USA, Canada, Europe, Africa and the Caribbean on the subject of information security, cybersecurity and audit. John is a member of the Toronto ISACA Chapter and has spoken at many ISACA Conferences and Chapter Events including ISACA Training Weeks. 2008 Recipient of the ISACA John Kuyer Best Speaker/Best Conference Contributor Award Page 6 of 6