Data Security and Management
PurposeInformation security, interoperability, and data management concerns must be resolved in order to maintain the appropriate privacy and to enable effective communication between agencies due to vulnerabilities and a lack of security skills applicable to today’s technological contexts. Participants in information security and data management training get knowledge and skills on how to incorporate highly effective best practices and standards for information security and data management into enterprises’ existing processes, technological assets, and management. Course ObjectivesParticipants will be capable of: Security Investment & Measurement; Cyber Risk Management & Security Metrics; Enterprise Security Governance & Planning; Realistic Security; Effective Incident Response; Managing Operational Threat; Developing a Crisis Communications Strategy; Building an Insider Threat Program; External Dependency Management at the conclusion of the course. Duration: 5 DaysTarget AudienceThis training program is intended for IT staff members, managers, and all departmental supervisors. The course is also intended for brand-new businesses that want to learn about information security to make sure their data is secure. Program OutlineTopic 1: Overview and Introduction
Topic 2: Information Security GovernanceInformation Security Governance, Information Security Management Topic 3: Threats to Information and risk managementRisk management includes introducing information security risk management, assessing and analyzing information security risks, mitigating information security risks, and continuously monitoring information security risks. Topic 4: Designing information security strategyImportance, significance, factors to take into consideration, and management responsibilities for information security. Topic 5: Standards, guidelines, policies, and proceduresIntroduction and Liability; Policy Foundations; Policy Lifecycle; Best Practices and Guidelines; Policy Lifecycle Information security technology includes an overview, trustworthy versus untrusted technologies, virtual local area networks, and information encryptions. Topic 6: Continuity of operations and disaster recovery
|
|