it information security management principles, 23 - 26 november 2015 dubai uae

5
 1 YOUR INTERNATIONAL COURSE FACILITATOR Dr Mark T. Edmead CISSP, CISA, COBIT, Lean IT, DevOpsB IT Tr ansformational Consultant MTE Advisors Mark T. Edmead is a successful technology entrepreneur with over 28 years of practical experience in computer systems architecture, information security, and project management. Mark excels in managing the tight-deadlines and ever changing tasks related to mission-critical project schedules. He has extensive knowledge in IT security, IT and application audits, Internal Audit, IT governance, including Sarbanes-Oxley, FDIC/FFIEC, and GLBA compliance auditing. Dr. Edmead understands all aspects of information security and protection including access controls, cryptography , security management practices, network and Internet security, computer security law and investigations , and physical security. He has trained Fortune 500 and Fortune 1000 companies in the areas of information, system, and Internet security. He has worked with many international rms, and has the unique ability to explain very technical concepts in simple-to-understand terms. Mr. Edmead is a sought after author and lecturer for information security and information technology topics. Mark works as an information security and regulatory compliance consultant. He has: Conducted internal IT audits in the areas of critical infrastructure/ systems and applications, Assessed and tested internal controls of critical infrastructure platform systems (Windows, UNIX, IIS, SQL, Oracle) Assessed and tested internal controls of various critical nancial applications. Prepared risk assessments and determined risks to critical nancial data systems and infrastructure components. Created test plans & processes and executed test plans. Conducted reviews of existing systems and applications, ensuring appropriate security, management and data integrity via control processes. Prepared written reports to all levels of management Participated in audit review panel sessions to address results, conclusions and follow-up actions required. T el: +6016 3326360 Fax: +603 9205 7788 kris@360bsigroup.com 1. An extensive IT Security Architecture Questionnaire that will help you evaluate your organization’ s security position. 2. Online access to course materials, case studies and other related items of the training seminar. 3. T ake with you templates and worksheets to aid you in applying and putting into practice what you have learned from this workshop. 4. FREE CoBIT 5.0 IT Governance Assessment Evaluation Spreadsheet  . An extensive ITSe  EXCLUSIVE:  c  PRE COURSE QUESTIONNAIRE & TAKEAWAYS “Security in IT is like locking your house or car – it doesn't stop the bad guys, but if it's good enough they may move on to an easier target.” - Paul Herbka Course Participants will:  Master the tools & techniques for eective information & network security.  Discover how to create a complete & sustainable IT security architectur e.  Gain knowledge on how to develop sound security policy together with your security architecture .  Learn how to perform smart security risk assessment within your organization.  Learn how to perform an IT governance assessment using CoBIT 5.0.  Gain valuable insights on implementing a proactive & robust security management system.  Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization. BENEFITS OF ATTENDING With the rapid growth & development of the internet, organizations are taking advantage of the new opportunities available. Likewise, unscrupulous individuals are also exploiting the situation to collect & steal data from companies & their customers. Information security is therefore critical for today's modern business models. Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats. Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.  This 4 day intensive trainin g workshop addresses the la test concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-c hanging security demands of the 21st century. COURSE OVERVIEW  IT SERIES 23 - 26 NOVEMBER 2015 RADISSON BLU DUBAI DEIRA CREEK UNITED ARAB EMIRATES IT INFORMA TION SECURITY MANAGEMENT PRINCIPLES

Upload: kristopher-kong

Post on 02-Nov-2015

2 views

Category:

Documents


0 download

DESCRIPTION

This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.Information security is critical for modern business models today.Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.Course Participants will:- Master the tools & techniques for effective information & network security.- Discover how to create a complete & sustainable IT security architecture.- Gain knowledge on how to develop sound security policy together with your security architecture.- Learn how to perform an IT governance assessment using CoBIT 4.0- Learn how to perform smart security risk assessment within your organization.- Gain valuable insights on implementing a proactive & robust security management system.- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization. Who should attend:Vice Presidents, Directors, General ManagersChief Information OfficersChief Security OfficersChief Information Security OfficersChief Technology OfficersContact Kris at [email protected] for further information.

TRANSCRIPT

  • 1YOUR INTERNATIONAL COURSE FACILITATOR

    Dr Mark T. Edmead CISSP, CISA, COBIT, Lean IT, DevOpsB

    IT Transformational ConsultantMTE Advisors

    Mark T. Edmead is a successful technology entrepreneur with over 28 years of practical experience in computer systems architecture, information security, and project management.

    Mark excels in managing the tight-deadlines and ever changing tasks related to mission-critical project schedules. He has extensive knowledge in IT security, IT and application audits, Internal Audit, IT governance, including Sarbanes-Oxley, FDIC/FFIEC, and GLBA compliance auditing.

    Dr. Edmead understands all aspects of information security and protection including access controls, cryptography, security management practices, network and Internet security, computer security law and investigations, and physical security.

    He has trained Fortune 500 and Fortune 1000 companies in the areas of information, system, and Internet security. He has worked with many international firms, and has the unique ability to explain very technical concepts in simple-to-understand terms. Mr. Edmead is a sought after author and lecturer for information security and information technology topics.

    Mark works as an information security and regulatory compliance consultant. He has:

    Conducted internal IT audits in the areas of critical infrastructure/ systems and applications,

    Assessed and tested internal controls of critical infrastructure platform systems (Windows, UNIX, IIS, SQL, Oracle)

    Assessed and tested internal controls of various critical financial applications.

    Prepared risk assessments and determined risks to critical financial data systems and infrastructure components.

    Created test plans & processes and executed test plans. Conducted reviews of existing systems and applications, ensuring appropriate security, management and data integrity via control processes.

    Prepared written reports to all levels of management Participated in audit review panel sessions to address results, conclusions and follow-up actions required.

    Tel: +6016 3326360 Fax: +603 9205 7788 [email protected]

    1. An extensive IT Security Architecture Questionnaire that will help you evaluate your organizations security position.

    2. Online access to course materials, case studies and other related items of the training seminar.

    3. Take with you templates and worksheets to aid you in applying and putting into practice what you have learned from this workshop.

    4. FREE CoBIT 5.0 IT Governance Assessment Evaluation Spreadsheet

    1.1. A Ann exextetensnsivivee ITIT S Sececevaluate your organizati

    EXCLUSIVE:ArArchchititecectuturere Q Queueststioionnnnaiairere t thahatt wiwillll h helelpp yoyouu i it iti

    ccururitity yi ti

    :: PRE COURSE QUESTIONNAIRE & TAKEAWAYS

    Security in IT is like locking your house or car it doesn't stop the bad guys, but if it's good enough they may move on to an easier target.

    - Paul Herbka

    Course Participants will: Master the tools & techniques for effective information & network security. Discover how to create a complete & sustainable IT security architecture. Gain knowledge on how to develop sound security policy together with your

    security architecture.

    Learn how to perform smart security risk assessment within your organization. Learn how to perform an IT governance assessment using CoBIT 5.0. Gain valuable insights on implementing a proactive & robust security management

    system.

    Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.

    BENEFITS OF ATTENDING

    With the rapid growth & development of the internet, organizations are taking advantage of the new opportunities available. Likewise, unscrupulous individuals are also exploiting the situation to collect & steal data from companies & their customers.

    Information security is therefore critical for today's modern business models. Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.

    Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.

    This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.

    COURSE OVERVIEW

    ITSERIES

    23 - 26 NOVEMBER 2015RADISSON BLU DUBAI DEIRA CREEKUNITED ARAB EMIRATES

    IT INFORMATIONSECURITYMANAGEMENTPRINCIPLES

  • 2WHO SHOULD ATTENDVice Presidents, Directors, General ManagersChief Information OfficersChief Security OfficersChief Information Security OfficersChief Technology OfficersHeads of Departments in Information SecurityManagement Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning

    WHY THIS EVENTThe aim of this interactive workshop is to provide you with the skills critical to developing your IT Security Architecture & Policies.After attending this workshop, you will leave fully armed with the knowledge needed to design and maintain a strong & secure IT infrastructure. The combination of interactive presentations, hands-on exercises and open discussion groups along with real case studies, ensures you will obtain maximum value from attending.

    COVERAGEIT Security Concepts & PrinciplesRoles & ResponsibilitiesSecurity AwarenessLayered Security approachSecurity Policy ImplementationRisk & Vulnerability AssessmentThreat IdentificationPenetration testingIT Network & System SecurityIT Security ArchitectureSecurity Design & MaintenanceSecurity Control FrameworksISO 27001 Security StandardLaws & regulationsDAY2 ESTABLISHING YOUR SECURITY POLICY

    We will discusses the value of the information and what we need to do to protect it. Effective security architecture begins with the establishment of a security policy. Organizations should also perform a risk assessment in order to better understand the important areas in their security architecture.

    Developing a Security Policy- The overall plan of attack/defense- Declaration of intent- Characteristics of a good policy- Policy examples

    Objectives of Risk Management- Benefits of performing a risk assessment- Prioritizing vulnerabilities and threats- Identifying the risk impact and determine acceptable risks- Creating a risk matrix

    The value of information- Why you need to classify levels of information- Managing data at rest and in transit- Understanding data access controls- The value of knowing where your data resides

    Basic security threats and principles- Vulnerabilities, threats and countermeasures- Hacker probing and attack- LAN, WAN, and wireless network technologies and protocols

    DAY1 IT SECURITY - CONCEPTS & PRINCIPLESWe will cover the main concepts, principles, structures, and standards used to design, monitor, and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, availability, and integrity.

    Laying the foundation- The relationship between people, process and technology- The information security triad: confidentiality, integrity and availability- Concepts of security management- Creating policies, standards, guidelines and procedures- Promoting security awareness

    Protecting our assets- Where attacks come from- Protecting from internal attacks- Protecting from external attacks- Threats and vulnerabilities overview

    Security Architecture Basics- Security as a design goal- Security models- Authentication methods- Authorization- Models for access control

    The Objectives of Security- The active defense approach to security- Using the Defense in Depth concept- Layered approach including perimeter security, network security, host based security, and human awareness

    COURSE CONTENT

  • 3COURSE SCHEDULE8.008.3010.10 - 10.3012.00 - 13.0014.40 - 15.0016.00

    Registration & Coffee/TeaWorkshop commencesMorning coffee/teaLunchAfternoon coffee/teaEnd of day

    Session well organized. The trainer is very conversant with the subject matter. Well delivered and would definitely recommend to anyone else. - Habil Mutende, Manager Information Security & Change Management, Central Bank of Kenya

    Excellent presentation, excellent attitude to answer our questions & to share his experience. - Senior Manager, IT Department, Deloitte

    The programme is good for IT professionals... [who] would like to setup ISO function or improve ISO. - G. Ramgopal, Head IT Security, Bank Muscat Oman

    I have used Mark in key roles with high visibility clients. Without hesitation I would highly recommend Mark for any and all IT audit engagements. His professionalism, deep knowledge, and results oriented work style are deeply valued by not only myself, but more importantly by the all those who are lucky enough to use his services. - Russ Aebig, Director at Artesient

    We have used Mark Edmead on several projects in the past few years including SOX readiness for publicly traded companies and IT vulnerability assessments for major financial institutions. He always delivers professional and detail-oriented workpapers on-time and within budget. Mark is highly recommended and we will continue to use him on other projects. - Brenda Piazza, Director at CBIZ MHM

    1

    3

    2

    4

    5

    Latest TESTIMONIALS

    DAY4 DESIGNING & MAINTAINING YOUR SECURITY ARCHITECTUREDay Four wraps up the course by providing a guideline on how to design, create, and maintain a strong security architecture. This includes a discussion on best IT Governance practices. We will also discuss how to make sure your technology infrastructure aligns with your security (and business) objectives. Implementing a proactive security management system- Justifying the cost of security- Aligning your technology infrastructure to business objectives- How to continually strengthen your security posture

    Understanding the various security control frameworks- COBIT 5 Governance and Management of IT Enterprise- ISO 270xx Security Standards- The NIST Standards

    Developing and implementing a successful governance strategy- The Balanced Scorecard and IT Governance- Governance of outsourcing- Managing risks and IT Governance- Best practices for implementing continuous improvement concepts and principles

    Understanding Strategic Alignment- Enterprise mission, objectives, and values- Drivers and trigger points- Benefits realization, risk optimization, and resource optimization- Business objectives and goals alignment to facilitate IT governance

    DAY3 THREAT, RISK & VULNERABILITYASSESSMENTWe will discuss the vulnerabilities, threats, and risks to the system and network environment. We will also discuss practical application of risk assessment to an organization, how to conduct an assessment, and how to use this information to improve the security posture. Vulnerability and Penetration testing- Why performing vulnerability and penetration testing is important - Tools and techniques used in penetration testing- Review of sample penetration testing report- How to correct problems identified in the vulnerability and penetration testing report

    Protecting the network- Firewalls and other perimeter security devices- Intrusion detection systems- Using a scanner to discover vulnerabilities- Understanding network management tools

    Hardening Operating Systems- Unused user accounts- Excessive rights and permissions- Service packs and hotfixes

    The importance of the Business Continuity and Disaster Recover Plans- Introduction to BCP/DRP- Conducting the Business Impact Assessment (BIA)- Review of the BCP/DRP process- Establishing data recover options

  • PAYMENT DETAILSFEES

    4

    OTHER RELATED PUBLIC COURSES IT Governance & Leadership Document Management & Retention Business Continuity and Disaster Recovery Planning Preparing for the CISSP exam Fraud Control & the COSO 2013 Framework IT Risk Management Project Management for IT Professionals

    360 BSI is passionate about providing strategic IT programs and high potential training solutions across the region to build personal competencies and organizational capability.

    You will receive practical training from a professionally qualified educator with over twenty years of teaching and training experience.

    Please feel free to mix-and-match topics from the areas listed below to get the right training content for your staff. Other topics may be available upon request.

    IN-HOUSE TRAINING

    Thank you for your registration!

    * Save up to 50% for In-house Training program

    Substitutions are welcome at any time. Please notify us atleast 2 working days prior to the event. All cancellations willcarry a 10% cancellation fee, once a registration form is received. All cancellations must be in writing by fax or email at least 2 weeks before the event date. Cancellations with less than 2 weeks prior to the event date carry a 100% liability. However, course materials will still be couriered to you.

    General Information:123

    45

    Cancellations/Substitutions

    Fax: +603 9205 7788

    Tel: +603 9205 7772

    Mobile: +6016 3326 360

    Email: [email protected]

    REGISTRATION FORM

    Hotel Contact Details:

    Payment is required within 5 days upon receipt of the invoice.

    All payments must be received prior to the event date

    15% discount - Special for Group of 3USD 3,395 per delegate

    Bank transfer:360 BSI MIDDLE EAST LIMITEDAbu Dhabi Commercial BankDubai Mall Branch, P.O.Box 49124 Dubai, U.A.EAccount No: 10065721319001Swift No: ADCBAEAAXXXIBAN No: AE780030010065721319001

    The fee does not include any taxes (withholding or otherwise). In case of any taxes applicablethe client has to ensure that the taxes are paid on top of the investment fee paid for the course. Compliance with the local tax laws is the responsibility of the client.

    360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL, 168 Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia.

    NameName on tagJob TitleEmailMobile

    : ::::

    NameName on tagJob TitleEmailMobile

    : ::::

    NameName on tagJob TitleEmailMobile

    : ::::

    1

    2

    3

    DELEGATES

    AUTHORIZATION (This form is invalid without a signature)

    Name :Job Title :Email :

    ( )Tel :Organization :Address :

    Signature : Date: / /

    23 - 26 NOVEMBER 2015RADISSON BLU DUBAI DEIRA CREEKUNITED ARAB EMIRATES

    For Room Reservation, contact for 360BSI corporate rates.Telephone: 00971 4 2057105 Fax: 00971 4 2234698E-mail: [email protected] BLU Hotel, Dubai Deira CreekBaniyas Road, P.O. Box 476, Dubai, UAE

    Registrations close ONE (1) week before the training dates.The fees cover lunch, tea breaks, materials and certificate.Official confirmation will be sent, once registration has been received.Participants will need to arrange their own accommodation.Attire: Smart Casual

    IT INFORMATIONSECURITYMANAGEMENTPRINCIPLES