By April 11, 2012 0 Comments Read More →

CERTIFIED INFORMATION SECURITY MANAGER

CERTIFIED INFORMATION SECURITY MANAGER (CISM)   
Estubizi Business Center, Jakarta Selatan |  25-29 Juni 2012 | 08.30 – 16.30 WIB | Rp 6.500.000,-

 

Descriptions :
The Certified Information Security Manager® (CISM®) certification program is developed specifically for experienced information security managers and those who have information security management responsibilities. The CISM certification is for the individual who manages, designs, oversees and/or assesses an enterprise’s information security (IS). The CISM certification promotes international practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management and consulting services. Individuals earning the CISM certification become part of an elite peer network, attaining a one-of-a-kind credential. The CISM job practice also defines a global job description for the information security manager and a method to measure existing staff or compare prospective new hires.  The course contents are impregnated by standard course recognized by CISA ( Certified Information Security  Auditor).
Objectives
The course has been designed to enhance the skill of participants in the area of security management, especially in relation to their day-to-day operation as related to information security management. The training shall provide the participant  with the following capabilities:

  1.  Have thorough understanding on Common Body of Knowledge within the scope of  Information Security Management
  2.  Enhanced knowledge and skill in dealing with the operational issues as related to information security within day-to-day installation operation
  3.  Enhanced the skill in the design, implement, manage, and asses the organization’s  IT security system by applying the Common Body of Knowledge in CISM
  4.  Prepare individual competency for the CISM professional exam
  5. To enhance the skill of the participants in Information Secuity, and escalate their  management  proficiency with broad managerial perspective essential for their day-to-day IT security  operation and preparing the skill for IT security management  procedural set up.
Benefits:

  • On completion of this module, delegates will have a detailed understanding

PROGRAM OUTLINE :

  •     Information Security Governance
  •     Information Risk Management
  •     Information Security Program(me) Development
  •      Information Security Program (me) Management
  •     Information Security Management
  •     Incident and Response Management
  •     An information security steering group function
  •     Legal and regulatory issues associated with Internet businesses, global transmissions and trans border data flows
  •     Common insurance policies and imposed conditions
  •     Information security process improvement
  •     Recovery time objectives (RTO) for information resources
  •     Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels.
  •     Security metrics design, development and implementation.
  •     Information security management due diligence activities and reviews of the infrastructure.

·        Events affecting security baselines that may

The requirements for collecting and presenting evidence; rules for evidence, admissibility of evidence, quality and completeness of evidence.
External vulnerability reporting sources
The key components of cost benefit analysis and enterprise migration plans

Privacy and tax laws and tariffs, data import/export restrictions, restrictions on cryptography, warranties, patents,

copyrights, trade secrets, national security
CISM information classification methods
Life-cycle-based risk management principles and practices.
Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels.
Security baselines and configuration management in the design and management of required risk assessment
Changes to information security requirements in security plans, test plans and re-performance
Disaster recovery testing for infrastructure and critical business applications, business applications and the infrastructure
Acquisition management methods and techniques
Evaluation of vendor service level agreements, preparation of contracts) CISM question and answer

AUDIENCE TARGET

  • Chief Information Security Officer (CISO)
  • Chief Information Officers (CIO)
  • Chief Technology Officers (CTO)
  • IS/IT Steering Committee
  • Audit Committee
  • IT Senior Manager
  • Information Security Manager
  • Senior Risk Manager
  • Senior Audit Manager
  • IT & Audit Staff
  • T Security Staff
  • Risk Management Staff
  • Academic students

Instructor :

DR.IR.Fauzi Hasan, MM, MBA, PMP, CISA, CISSP, SSCP, CISM, CGEIT, CPRC, CSCP, APICS, Cert. , ITIL Expert, Change Management (APMG), Prince2

Tanggal

  •  25-29 Juni 2012
  • Pukul : 08.30 – 16.30 WIB

VENUE

Estubizi Business Center,
Setiabudi Building 2 Lantai 1
Jl.HR.Rasuna Said ,Kuningan, Jakarta Selatan

INVESTASI :

  • Rp 6.500.000,-
  • Peserta Non-Residential.
  • Sudah termasuk Meeting Package, Training Kits, Modul Pelatihan dan Sertifikat.

 

Formulir Permintaaan Informasi Lanjutan / Pra-Pendaftaran Public Training
  1. INFORMATION OPTIONS
  2. (required)
  3. PERSONAL DATA
  4. (required)
  5. (required)
  6. (required)
  7. (valid email required)
  8. (required)
  9. (required)
  10. PRE REGISTRATION DATA (Tidak Mengikat)
  11. (required)
  12. MESSAGE FOR TRAINING PROVIDER
 

Share and Enjoy: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • TwitThis
  • Facebook
  • LinkedIn
  • Google Bookmarks
  • Y!GG
  • Digg
  • del.icio.us
  • StumbleUpon
  • Reddit
  • MySpace
  • Technorati
  • YahooMyWeb
  • YahooBuzz

About the Author:

http://www.twitter.com/avisdjamal

Post a Comment