CISM - Certified Information Security Manager

Training

In Wembley

£ 1,465 + VAT

Description

  • Type

    Training

  • Location

    Wembley

HA9CISM is the most prestigious global qualification available for information security managers today - and the fastest growing with nearly six thousand certifications since being introduced in 2002.

Facilities

Location

Start date

Wembley (Middlesex)
HA9

Start date

On request

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

Description
is the most prestigious global qualification available for information security managers today - and the fastest growing with nearly six thousand certifications since being introduced in 2002.

Who is this course suitable for?
Individuals with five years or more of experience managing information security will find CISM tailored to their expertise and the increasing global demand for high standards of certified professionalism.

Suitable For:
· Security professionals with 3-5 years of front-line experience
· Information security managers or those with management responsibilities
· Information security staff
· Other information security assurance providers who require and in-dept understanding of information security management including:
· CISO's,
· CIO's
· CSO's
· Privacy officers
· Risk managers
· Security auditors
· Compliance personnel
· BCP / DR personnel, executive and operational managers responsible for assurance functions
What does this course cover?
The skills and knowledge of the core competencies required of a world class information security professional whether planning to sit for the examination or not, they will have gained this in a structured learning environment.
Gain the knowledge required for, and have thoroughly prepared for the certification examination in systematic way.

During the course, you will learn:

Information Security Governance
· Develop information security strategy to align with business strategy and direction.
· Obtain senior management commitment and support for information security across the entire enterprise.
· Define information security governance roles and responsibilities.
· Establish reporting and communication channels regarding information security governance activities.
Risk Management
· Develop a systematic, analytical, and continuous risk management process
· Understand and implement risk identification, analysis, and mitigation activities
· Define and prioritize risk mitigation strategies
· Appropriately report changes in risk to the correct levels of management on a periodic and event-driven basis
Information Security Program Management
· Create and maintain plans for implementing a carefully designed information security governance framework
· Develop information security baselines from organizational needs, as well as international standards
· Develop guidelines and procedures for integrating security risk management into business processes
· Develop procedures and guidelines for the IT infrastructure that comply with senior - level information security policies
· Ensure security is effectively incorporated into the organizations established change management processes
· Effectively integrate information security policies, guidelines, procedures, and accountability into the organization's culture
Legal Issues
· Manage security risk from contracts; transfer risk with contracts
· Understand information security compliance issues resulting from Sarbanes-Oxley
Information Technology Deployment Risks
· Properly align IT strategic planning with organizational strategic planning
· Control risk within software development or acquisition projects
IT Management Risks
· How to position information security management within the organization
· Control IT security risk relating to IT funding
IT Networks and Telecommunications Risks
· Manage risk associated with social engineering, physical infrastructure threats, malicious code, and software vulnerabilities
Integrating Information Security into Business Continuity, Disaster Recovery, and Incident Response
· Develop and implement processes for identifying, detecting, and analyzing security - related events procedures
· Organize, train, and properly equip response teams
Please be aware: The cost of the exam is not included in this course. The exam is taken at a different venue on another date.
Are there entry requirements?
There are no formal entry requirements
What's included?
Our package includes lunch and refreshments, and full course materials.

Although the course is non-residential, we offer help finding appropriate hotels, close to the training venue. To take advantage of this offer, drop us an email after you book your course.

Read what others have said about our training courses

Additional info
Please note: the exam is not taken during this training course. It needs to be booked & paid for directly with the exam board, please contact us for more details.

CISM - Certified Information Security Manager

£ 1,465 + VAT