Information/ Cyber Security Management

This Information/ Cyber Security Management Class provides a valuable exposure to the globally adopted Cyber Security Best Practices and how it will assist individuals in strengthening the security risk posture of their organizations.

Target Audience:

  • CIO/ CTO
  • CISO/ IT Governance Heads
  • Executive Management
  • Network and Security Professionals

Key Learning Outcome:

  • Recognize the importance of Information/ Cyber Security Management
  • Learn how to conduct risk management and security incident management.
  • Develop a road map to achieve compliance and regulatory requirements related to cybersecurity.

Trainer Biography: Mr. Shams Khan

Mr. Shams Khan is a passionate and dynamic professional with 9+ years of experience in IT Audits, Cyber Security, Privacy and Business Continuity Risk Management domain and trainings. Experienced in handling IT Risk Management in Financial, Technology, Energy, Manufacturing, Oil & Gas and Telecommunication and Aviation sector. Well-versed in direct and remote analysis with strong critical thinking, communication, and analysis skills. Well versed in developing business proposals in response to RFP’s. Worked in in multiple locations which includes India, Germany, UAE, Saudi Arabia and Kingdom of Bahrain.

Below are his qualifications, certifications and memberships:

  • Post Graduate Diploma in Business Management (MBA in E – Business) Wellingkar Institute of Management Development and Research (WeSchool), Mumbai, India
  • Bachelors of Engineering (B.E) – Electronics Ramrao Adik Institute of Technology, Mumbai University, India
  • Diploma in Cyber Law (India) Government Law College, Mumbai, India
  • CISA Certified, ISACA
  • CBCI Certified, AMBCI (UK)
  • TUV SUD GDPR Practitioner Certified
  • ISO ISMS 27001: 2013 Lead Auditor Certified
  • ISO BCMS 22301:2012 Lead Auditor Certified
  • ITIL V3 Foundation Certified
  • COBIT 5 Foundation Certified
  • Qualys Guard Certified
  • AWS Certified Solutions Architect

Session One: Information Security Governance

1
Understanding Key controls of Information Security Management
2
Understanding roles and responsibilities of Information Security officer
3
Practice design thinking by going through the whole process to test and improve ideation and prototyping.

Session two: Information Security Risk Management

1
Risk Management Concepts
2
Implementing a Risk Management Program
3
Understanding Risk Management Life Cycle
4
Operational Risk Management

Session three: Information Security Program Development

1
Security Program Development
2
Security Program Operations
3
IT Service Management
4
Information Security Programs
5
Information Security Controls
6
Key Metrics and Monitoring
7
Continuous Improvement

Session four: Information Security Incident Management

1
Security Incident Response Overview
2
Incident Response Plan Development
3
Responding to Security Incidents
4
Business Continuity and Disaster Recovery Planning

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Get course
Enrolled: 1 student
Duration: 5 Days
Lectures: 18
Video: 1:30 Hours
Level: Advanced

Working hours

Monday 8:30 am - 6.00 pm
Tuesday 8:30 am - 6.00 pm
Wednesday 8:30 am - 6.00 pm
Thursday 8:30 am - 6.00 pm
Friday Closed
Saturday 8:30 am - 6.00 pm
Sunday 8:30 am - 6.00 pm