applying risk management to cyber & information security · 2020. 6. 18. · applying risk...

4
Applying Risk Management to Cyber & Information Security

Upload: others

Post on 14-Sep-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Applying Risk Management to Cyber & Information Security · 2020. 6. 18. · APPLYING RISK MANAGEMENT TO CYBER & INFORMATION SECURITY AbOuT THis CO uRse It has become inevitable that

Applying Risk Management toCyber & Information Security

Page 2: Applying Risk Management to Cyber & Information Security · 2020. 6. 18. · APPLYING RISK MANAGEMENT TO CYBER & INFORMATION SECURITY AbOuT THis CO uRse It has become inevitable that

APPLYING RISK MANAGEMENT TOCYBER & INFORMATION SECURITY

AbOuT THis COuRse

It has become inevitable that we will make use of or interact with technology in some way on a daily basis.The advance of technology now means that it is close to impossible to do business without it. Theprogressive use of technology requries for risk management practitioners to adapt their approach. Thiscourse is designed to provide risk managers with knowledge to understand this cyber and technologicallyenabled world we live in and equip them with risk management principles that work in addressinginformation security risks.

Information Technology, Information Security or Business:

• Risk Practitioners• Risk Managers, or• Risk Owners

WHO sHOuLD ATTenD

Module 1:Information Security fundamentals

• Information and cyber security overview and awareness

Module 2:Embedding Information Security Risk Management

• Recap of risk and risk management fundamentals

• Understanding risk management principles in information security

• Application of information security risk management principles

Module 3:Case study for practical implementation from abusiness context

• Facilitated ‘case study sessions’ based on practical, real life scenarios for the implementation of information security and cyber security principles in business scenarios

Module 4:Meaningful Reporting

• Meaningful reporting of information security risks to business stakeholders

• Tracking and monitoring information security risk in a changing technology landscape

Outcomes:

• Understand the cyber and information security landscape from a risk perspective• Practical knowledge on how to fulfill risk management role and responsibility in information

security• Practical knowledge of how to integrate risk management principles with information security

processes

Page 2 of 3

Page 3: Applying Risk Management to Cyber & Information Security · 2020. 6. 18. · APPLYING RISK MANAGEMENT TO CYBER & INFORMATION SECURITY AbOuT THis CO uRse It has become inevitable that

AbOuT THe FACiLiTATOR

R COsTs

Member Webinar Rate: R 2 750.00 ex VAT Non-Member Webinar Rate: R 3 350.00 ex VAT

Data is a key asset for most organisations therefore it is vital that data is protected from disruption or loss through cybercrime. When it comes to the protection of an organisation’s data, prevention is better than cure. This principles and practical concepts shared in this course will provide delegates with the confidence and ability to tackle cyber security assessments and identify controls to mitigate risks that threaten the confidentiality, integrity and availability of data or information in the organisation.

HOW WiLL YOu beneFiT

Zandile Pearl Hlabangana

An Information Security and IT Risk Management and Governance professional with over 14 years of working experience in the field of IT advisory services, security audits, risk management and compliance services. A highly motivated and dynamic professional with analytical and problem solving skills. She has led and managed the roll out of information security and cyber related risk and governance roles for organisations with complex structures, operating in multiple jurisdictions both in South Africa and the rest of Africa.

Page 4: Applying Risk Management to Cyber & Information Security · 2020. 6. 18. · APPLYING RISK MANAGEMENT TO CYBER & INFORMATION SECURITY AbOuT THis CO uRse It has become inevitable that

COnTACT usPostnet suite 616Private bag X43sunninghill 2157

144 Katherine street Grayston Ridge Office Park block A, First Floor, iRMsA

[email protected] | 011 555 1800

TeRMs AnD COnDiTiOns

Please review the Terms and Conditions carefully before booking. Delegates should review the content and levels of the course they are registering for to ensure suitability and that theyare registering for the correct course.

Payment:

IRMSA must receive payment or an approved and signed Purchase Order prior to the training.

Full payment must be received 2 weeks prior to the course. Proof of payment must be emailed to [email protected].

Cancellation:

Should a delegate wish to cancel, this must be done in writing to [email protected] no later than 7 working days prior to the training course. A R1 190.00 ex VAT cancellation fee will apply.

• Delegates who cancel their registration inwriting after 7 working days will bepersonally liable for the full fee.

• Substitutions may be made at no additionalcost.

• Delegates will be personally liable for thepayment of the full registration fee in theevent of non-attendance or failure to cancelin writing prior to the deadline of 7 workingdays.

Please note:

IRMSA endeavours to host the specified training on the date as advertised. However, if unforeseen circumstances arise or due to extenuating circumstances out of our control, IRMSA reserves the right to cancel the training.

IRMSA does not store credit card details nor do we share customer details with any 3rd parties.

IRMSA reserves the right to make changes to the training programme. IRMSA reserves the right to refuse any booking.