Enterprise Data Secutity and Risk Management Course Schedule
Type a city name
Venue | Start Date | End Date | Details |
---|---|---|---|
Istanbul , Turkey | 1 - 10 - 2023 | 5 - 10 - 2023 |
|
London , UK | 8 - 10 - 2023 | 12 - 10 - 2023 |
|
Dubai , UAE | 15 - 10 - 2023 | 19 - 10 - 2023 |
|
Paris , France | 15 - 10 - 2023 | 19 - 10 - 2023 |
|
Kuala Lumpur , Malaysia | 22 - 10 - 2023 | 26 - 10 - 2023 |
|
Kuala Lumpur , Malaysia | 5 - 11 - 2023 | 9 - 11 - 2023 |
|
Istanbul , Turkey | 12 - 11 - 2023 | 16 - 11 - 2023 |
|
Dubai , UAE | 19 - 11 - 2023 | 23 - 11 - 2023 |
|
Paris , France | 19 - 11 - 2023 | 23 - 11 - 2023 |
|
London , UK | 26 - 11 - 2023 | 30 - 11 - 2023 |
|
London , UK | 3 - 12 - 2023 | 7 - 12 - 2023 |
|
Istanbul , Turkey | 10 - 12 - 2023 | 14 - 12 - 2023 |
|
Dubai , UAE | 17 - 12 - 2023 | 21 - 12 - 2023 |
|
Paris , France | 17 - 12 - 2023 | 21 - 12 - 2023 |
|
Kuala Lumpur , Malaysia | 24 - 12 - 2023 | 28 - 12 - 2023 |
|
Istanbul , Turkey | 7 - 1 - 2024 | 11 - 1 - 2024 |
|
Kuala Lumpur , Malaysia | 14 - 1 - 2024 | 18 - 1 - 2024 |
|
London , UK | 21 - 1 - 2024 | 25 - 1 - 2024 |
|
Dubai , UAE | 28 - 1 - 2024 | 1 - 2 - 2024 |
|
Paris , France | 28 - 1 - 2024 | 1 - 2 - 2024 |
|
London , UK | 4 - 2 - 2024 | 8 - 2 - 2024 |
|
Istanbul , Turkey | 11 - 2 - 2024 | 15 - 2 - 2024 |
|
Kuala Lumpur , Malaysia | 18 - 2 - 2024 | 22 - 2 - 2024 |
|
Dubai , UAE | 25 - 2 - 2024 | 29 - 2 - 2024 |
|
Paris , France | 25 - 2 - 2024 | 29 - 2 - 2024 |
|
Kuala Lumpur , Malaysia | 3 - 3 - 2024 | 7 - 3 - 2024 |
|
London , UK | 10 - 3 - 2024 | 14 - 3 - 2024 |
|
Dubai , UAE | 17 - 3 - 2024 | 21 - 3 - 2024 |
|
Paris , France | 17 - 3 - 2024 | 21 - 3 - 2024 |
|
Istanbul , Turkey | 24 - 3 - 2024 | 28 - 3 - 2024 |
|
Kuala Lumpur , Malaysia | 7 - 4 - 2024 | 11 - 4 - 2024 |
|
Istanbul , Turkey | 14 - 4 - 2024 | 18 - 4 - 2024 |
|
London , UK | 21 - 4 - 2024 | 25 - 4 - 2024 |
|
Dubai , UAE | 28 - 4 - 2024 | 2 - 5 - 2024 |
|
Paris , France | 28 - 4 - 2024 | 2 - 5 - 2024 |
|
Course Description
Objectives:
- How to take control of Risk Management Programme and learn appropriate methods.
- How to identify and address risk and compliance issues as presented within a global economy.
- How to design and leverage Risk Management Programme to reduce cost and risk through effective prioritisation and processes.
- Appreciate legal, technical and management risk within the Enterprise Environment and how to quantify these effectively.
- Appreciate the external risk of cyber crime.
- How to measure the financial value of Data Security and Risk Management and communicate these to line executives effectively.
- How governance and risk management trends are affecting corporate enterprises.
- International Standards for Data Security and Risk Management and best practice for managing compliance for security, crisis management, disaster recovery and high resilience and availability.
The Content:
Development of Enterprise Architecture- Introduction, Development and Role in Modern Enterprise
- Strategic, Tactical and Operational Considerations
- Key Considerations in Development of Enterprise Architecture
- Enterprise Architecture Project Management Considerations
- Categorising and Managing Risk
- Risk Analysis and Threat Identification Methodologies
- Vulnerability Analysis
- Understanding the need for effective Risk Management
- Legal and Regulatory Considerations
- Key Strategic and Security Considerations
- Electronic and physical risk
- Utilising Information Security to protect business assets
- Information and Data Risk Management
- Data and asset classification
- Ensuring Information Security in an Enterprise Wide Environment
- Vulnerability Assessments
- Management and Technical Control Measures with Systems and Network Design
- Data Protection
- Intellectual Property
- Contracts and Commercial Liability
- Defining data classification and business ownership
- Establishing Memorandum of Understanding/Transfer Agreements
- Best Practice Guidance for data sharing
- Avoiding common errors and liability
- Types of electronic and management controls for electronic information
- Network, Operating System and Application controls and password schemes
- Ensuring Confidentiality, Integrity, Availability, Authenticity and Accountability
- Overview of ISO27002 Code of Practice for Information Security Management and Relevant Controls
- ISO 3100 Risk Management Principles and Guidelines
- Challenges within Enterprise Architecture and IS environments
- Common Oversights with Enterprise Architecture and IS Environments
- Risk Management and Compliance
- Success Factors for Effective Enterprise Data Security Management