Information/ Cyber Security Management

This Information/ Cyber Security Management Class provides a valuable exposure to the globally adopted Cyber Security Best Practices and how it will assist individuals in strengthening the security risk posture of their organizations.

Target Audience:

  • CIO/ CTO
  • CISO/ IT Governance Heads
  • Executive Management
  • Network and Security Professionals

Key Learning Outcome:

  • Recognize the importance of Information/ Cyber Security Management
  • Learn how to conduct risk management and security incident management.
  • Develop a road map to achieve compliance and regulatory requirements related to cybersecurity.

Trainer Biography: Mr. Shams Khan

Mr. Shams Khan is a passionate and dynamic professional with 9+ years of experience in IT Audits, Cyber Security, Privacy and Business Continuity Risk Management domain and trainings. Experienced in handling IT Risk Management in Financial, Technology, Energy, Manufacturing, Oil & Gas and Telecommunication and Aviation sector. Well-versed in direct and remote analysis with strong critical thinking, communication, and analysis skills. Well versed in developing business proposals in response to RFP’s. Worked in in multiple locations which includes India, Germany, UAE, Saudi Arabia and Kingdom of Bahrain.

Below are his qualifications, certifications and memberships:

  • Post Graduate Diploma in Business Management (MBA in E – Business) Wellingkar Institute of Management Development and Research (WeSchool), Mumbai, India
  • Bachelors of Engineering (B.E) – Electronics Ramrao Adik Institute of Technology, Mumbai University, India
  • Diploma in Cyber Law (India) Government Law College, Mumbai, India
  • CISA Certified, ISACA
  • CBCI Certified, AMBCI (UK)
  • TUV SUD GDPR Practitioner Certified
  • ISO ISMS 27001: 2013 Lead Auditor Certified
  • ISO BCMS 22301:2012 Lead Auditor Certified
  • ITIL V3 Foundation Certified
  • COBIT 5 Foundation Certified
  • Qualys Guard Certified
  • AWS Certified Solutions Architect

Session One: Information Security Governance

Understanding Key controls of Information Security Management
Understanding roles and responsibilities of Information Security officer
Practice design thinking by going through the whole process to test and improve ideation and prototyping.

Session two: Information Security Risk Management

Risk Management Concepts
Implementing a Risk Management Program
Understanding Risk Management Life Cycle
Operational Risk Management

Session three: Information Security Program Development

Security Program Development
Security Program Operations
IT Service Management
Information Security Programs
Information Security Controls
Key Metrics and Monitoring
Continuous Improvement

Session four: Information Security Incident Management

Security Incident Response Overview
Incident Response Plan Development
Responding to Security Incidents
Business Continuity and Disaster Recovery Planning

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Get course
Enrolled: 1 student
Duration: 5 Days
Lectures: 18
Video: 1:30 Hours
Level: Advanced

Working hours

Monday 8:30 am - 6.00 pm
Tuesday 8:30 am - 6.00 pm
Wednesday 8:30 am - 6.00 pm
Thursday 8:30 am - 6.00 pm
Friday Closed
Saturday 8:30 am - 6.00 pm
Sunday 8:30 am - 6.00 pm