This presentation will review the ISMS and architectural considerations that need to be addressed. An ISMS can help an organization effectively and efficiently manage information security related risks.
This presentation will draw on best practices from ISO/IEC 27001, 27002, COBIT and the author's experiences in internal audit and information security.
This presentation will draw on best practices from ISO/IEC 27001, 27002, COBIT and the author's experiences in internal audit and information security.
Areas Covered in the seminar:
- Background of the need for an ISMS.
- The Plan-Do-Check-Act model.
- The need for Risk Management.
- Must use a top-down approach vs. bottom up.
- How to leverage the IIA's GAIT-R to move faster.
- How to select and blend layered controls.
- The need for Situational Awareness.
Who Will Benefit:
- IT operations and support staffs as well as compliance
- Audit and information security personnel who are looking for best practices relating to Access Management
Course Provider
George Spafford,