Information session April 2nd, Master 2 in Information System Security Management (ISSM)

Size: px
Start display at page:

Download "Information session April 2nd, 2015. Master 2 in Information System Security Management (ISSM)"

Transcription

1 Information session April 2nd, 2015 Master 2 in Information System Security Management (ISSM)

2 Master s team Prof. Yves Le Traon Study director Rita Giannini Study coordinator

3 Master s team Nicolas Mayer Study director Bahija Sebane Training officer Chrystel Petiteville Training assistant

4 Other actors CLUb de la Sécurité des Systèmes d'information Luxembourgeois Portail de la sécurité de l'information du Ministère de l'economie et du Commerce extérieur Collège des Professionnels de la Sécurité de l Information Commission de Surveillance du Secteur Financier

5 Motivation Business relies on information systems The availability of these systems becomes critical The number of security incidents is growing rapidly Security management is now crucial Legal and regulatory constraints are arising Then Needs for training information security professionals and experts! Requires advanced and diverse competencies

6 Public Consultants / auditors Business owner CISO (Chief Information Security Officer) Professional people responsible for information security IT engineers, IT Managers Related Professions (Lawers, cybercops, etc.) Big companies SMEs administrations Financial sector Health sector Industries Public sector Other sectors

7 Objective Train experienced professionals to give skills of the chief information security officer (CISO)

8 The CISO (Chief Information Security Officer) Corporate Executive A job that deals with the whole organisation «Compliance» department «Risk Management» department IT department User services

9 Interdisciplinary training Legislation and regulation Security standards Security Audit Methodologies For information security Organisation Technologies For securing information and systems Enterprise management Project management Risk Management Security management

10 Program

11 Program Module 1 - Understanding organisations and management 9 ECTS Course hours Organisational theory and change 12 Architecture and business strategy 18 Financial Management 6 Project Management 12 IT Service Management 6 TOTAL 54

12 Program Module 2 Regulatory frameworks 8 ECTS Course hours Legal and regulatory aspects 18 Law enforcement 12 Special businesses and impacts 18 TOTAL 48

13 Program Module 3 Information Security Management 12 ECTS Course hours Information Security Management System ISMS 12 Risk analysis practices 6 Risk analysis and management 12 Electronic records management 12 Security Policy 12 Compliance Assurance 12 Business Continuity Management 6 TOTAL 72

14 Program Module 4 Technical aspects 12 ECTS Course hours Information Security Technologies 1 12 Information Security Technologies 2 12 Communication, information processing and persistence 1 Communication, information processing and persistence 2 Threats, attacks and controls TOTAL 72

15 Program Module 5 Human aspects 4 ECTS Course hours Human risk 12 Human communication 12 TOTAL 24

16 Program Module 6 Professional part 15 ECTS Course hours Working in information security management 6 Professional project n/a

17 ISED Information Security Education Day 2015 Theme: Understanding Data Protection challenges The ISED is an event that aims providing each year new knowledge on a hot-topic related to security and privacy. Primarily it targets the current and former students of the professional (Master en management de la sécurité des systèmes d'information). However the ISED also provides an ideal forum where academics and practitioners can learn about the different facets of a key-topic, exchange, discuss ideas, and compare experiences. Friday 22nd May 2015

18 Program = 6 modules 1 9 ECTS Understanding organisations and management 8 ECTS Regulatory frameworks ECTS Professional part 12 ECTS Information security Management ECTS Human aspects 12 ECTS Technical aspects 4

19 Schedule Understanding organisations and management Regulatory frameworks Information security Management Technical aspects Working in information security management Human aspects Professional part semester 1 semester 2 semester 3 semester 4 60 ECTS

20 1st promotion

21 Professional discussions in a good atmosphere!

22 Practical information Calendar 276 hours: academic courses In english Two academic years, in 20/25 sessions of 2 consecutive days Friday and Saturday from 9.00 a.m. to 5.30 p.m. The exact schedule is given at the beginning of each semester 4 to 6 months: professional project Place CRP Henri Tudor on Fridays Université du Luxembourg on Saturdays Fees: 4600 * including Registration at the University of Luxembourg Training fees * FEES MAY CHANGE Electronic communication tool Moodle Course start date September 18th, 2015

23 Registration 1/ Preselection application: April 24th - rita.giannini@uni.lu Resumé + cover letter + letter from employer if possible Minimum requirement = BAC+4 level (or 3 years of experience for each missing year) and a background/experience in IT 2/ Interview: TBD 3/ Final registration online via management_de_la_securite_des_systemes_d_information_professionnel 4/ Course start date: September 18th, 2014

24 Contact Rita Giannini

AND. Course Offer for 2015-2016 Exchange Students BBA - Bachelor International 2 nd Year Non Double Degree (NDD) BBA 2 nd Year (NDD)

AND. Course Offer for 2015-2016 Exchange Students BBA - Bachelor International 2 nd Year Non Double Degree (NDD) BBA 2 nd Year (NDD) nd Non Double Degree (NDD) BBA nd (NDD) Fall - SEM (September - December) Language ECTS BBA- nd French RHMGRHLF003 Leadership et Management French 4 STRSTRLF008 Techniques du Commerce International French

More information

Master in Accounting and Audit. Master académique

Master in Accounting and Audit. Master académique Master in Accounting and Audit Master académique " A research centered university with a personal atmosphere and multicultural flair " Students at the University of Luxembourg 2 1 " an international, dynamic

More information

FEE Qualification and Market Access Working Party

FEE Qualification and Market Access Working Party FEE Qualification and Market Access Working Party Structure and Organisation of the Accountancy Profession Key features Luxembourg Status: March 2012 Contact persons: Guay Michel, IRE, e-mail: mguay@ire.lu

More information

Politique de sécurité de l information Information Security Policy

Politique de sécurité de l information Information Security Policy Politique de sécurité de l information Information Security Policy Adoptée par le Conseil d administration Le 10 novembre 2011 Adopted by the Board of Directors on November 10, 2011 Table of contents FOREWORD

More information

Master in Mathematics

Master in Mathematics Master in Mathematics Master académique General Mathematics Financial Mathematics The numbers of left and right spirals of a sunflower are consecutive numbers of the Fibonacci sequence 0, 1, 1, 2, 3, 5,

More information

Question: 1 Which of the following should be the FIRST step in developing an information security plan?

Question: 1 Which of the following should be the FIRST step in developing an information security plan? 1 ISACA - CISM Certified Information Security Manager Exam Set: 1, INFORMATION SECURITY GOVERNANCE Question: 1 Which of the following should be the FIRST step in developing an information security plan?

More information

Academic Calendar 2015-2016

Academic Calendar 2015-2016 Academic Calendar 2015-2016 Fall 2015 - Full/TCAT Session August 24, 2015 - December 10, 2015 Fall 2015-1st Session August 24, 2015 - October 9, 2015 Fall 2015-2nd Session October 14, 2015 - December 10,

More information

Information security risk management using ISO/IEC 27005:2008

Information security risk management using ISO/IEC 27005:2008 Information security risk management using ISO/IEC 27005:2008 Hervé Cholez / Sébastien Pineau Centre de Recherche Public Henri Tudor herve.cholez@tudor.lu sebastien.pineau@tudor.lu March, 29 th 2011 1

More information

Adopt the following: Section A

Adopt the following: Section A Grand-Ducal Regulation of 9 July 2013 determining the requirements for the professional qualification of Réviseur d Entreprises pursuant to the Law of 18 December 2009 on the audit profession We Henri,

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

APPLICATION PROCEDURE FOR INCOMING STUDENTS

APPLICATION PROCEDURE FOR INCOMING STUDENTS INSEEC Bordeaux Application procedure for Incoming Students 2013-2014 APPLICATION PROCEDURE FOR INCOMING STUDENTS Dear Colleagues, The application period 2013-2014 for Incoming Students wishing to study

More information

Information Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer

Information Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer Information Security Management Systems Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer atsec information security, 2013 ISO/IEC 27001 and related

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG

Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG 11:30 am -12:15 pm Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG Agenda Introduction 20 Questions you should

More information

The problem of cloud data governance

The problem of cloud data governance The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

-gain a unique insight into the history, politics, economics and cultural diversity of Latin America

-gain a unique insight into the history, politics, economics and cultural diversity of Latin America This specification provides a concise summary of the main features of the minor and the learning outcomes that a typical student might reasonably be expected to achieve and demonstrate if s/he takes full

More information

www.pwc.ru/capital-markets Guide to listing of debt on European stock exchanges

www.pwc.ru/capital-markets Guide to listing of debt on European stock exchanges www.pwc.ru/capital-markets Guide to listing of debt on European stock exchanges 2 PwC A number of European stock exchanges have become major centres for listing debt securities. The London, Irish and Luxembourg

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

EU Financial Services Law: How Financial Institutions Meet Internal Governance and Risk Management Requirements?

EU Financial Services Law: How Financial Institutions Meet Internal Governance and Risk Management Requirements? Seminar EU Financial Services Law: How Financial Institutions Meet Internal Governance and Risk Management Requirements? Luxembourg, 9-10 November 2015 European Institute of Public Administration European

More information

Le pari des centres de compétences dans la stabilisation des organisations en phase post-projet ERP

Le pari des centres de compétences dans la stabilisation des organisations en phase post-projet ERP Systèmes d'information et Management Volume 16 Issue 1 Article 3 2011 Le pari des centres de compétences dans la stabilisation des organisations en phase post-projet ERP Guy Saint Léger Ecole Supérieure

More information

Revised October 2013

Revised October 2013 Revised October 2013 Version 3.0 (Live) Page 0 Owner: Chief Examiner CONTENTS: 1. Introduction..2 2. Foundation Certificate 2 2.1 The Purpose of the COBIT 5 Foundation Certificate.2 2.2 The Target Audience

More information

Fund Services Intelligence

Fund Services Intelligence Fund Services Intelligence AIF & UCITS platforms Launching or transferring your vehicle Processing risk management Providing investment management Servicing your structure We look after regulatory tasks

More information

Under the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems

Under the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems Under the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems The Research Group on QHSE Sidi Mohamed Ben Abdellah

More information

Information Security Management Systems

Information Security Management Systems Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

Cyber Security key emerging risk Q3 2015

Cyber Security key emerging risk Q3 2015 Cyber Security key emerging risk Q3 2015 The study is based on interviews with CIO:s, CISO:s and Head of Security in August and September 2015. November 2015 www.pwc.se Companies falling behind are more

More information

Security Managers - A Practical Approach

Security Managers - A Practical Approach Managing e-health data: Security management in practice Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: mnyssen@vub.ac.be Structure of the presentation Practical approach towards

More information

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course Achieving Governance, Risk and Compliance Requirements with HISP Certification Course in corporation with A unique information security and regulatory compliance certification course that provides IT security

More information

3 STAGE PUBLIC PROGRAMS PROFESSIONAL NEGOTIATION & INFLUENCING PROGRAM. g Negotiate with confidence g Do deals that deliver g Get what YOU want

3 STAGE PUBLIC PROGRAMS PROFESSIONAL NEGOTIATION & INFLUENCING PROGRAM. g Negotiate with confidence g Do deals that deliver g Get what YOU want 3 STAGE PUBLIC PROGRAMS PROFESSIONAL NEGOTIATION & INFLUENCING PROGRAM g Negotiate with confidence g Do deals that deliver g Get what YOU want THE ENS INTERNATIONAL PROFESSIONAL NEGOTIATION AND INFLUENCING

More information

Records and Document Management

Records and Document Management Records and Document Management Policy P3 Current: Updated November 2011 Table of Contents Purpose... 3 Scope... 3 Definitions... 3 Policy statement... 4 Responsibility... 4 Legislative context... 5 Associated

More information

Table of Contents. 1. Organisation and Management (5 ECTS) 1.1. Management

Table of Contents. 1. Organisation and Management (5 ECTS) 1.1. Management Table of Contents 1. Organisation and Management (5 ECTS)...1 1.1. Management...1 1.2. Personnel Management...2 1.3. Recruitment and Selection...2 1.4. Information Management...2 1.5. Career Planning...2

More information

Master in Public Management and Policy (PMP) Specialisation in Public Management and Economics Specialisation in Public Communication

Master in Public Management and Policy (PMP) Specialisation in Public Management and Economics Specialisation in Public Communication Master in Public Management and Policy (PMP) Specialisation in Public Management and Economics Specialisation in Public Communication Agenda Why choose Università della Svizzera italiana () The specialisations

More information

Welcome presentation 2012-2013

Welcome presentation 2012-2013 http://master.irisa.fr Welcome presentation 2012-2013 Isabelle Puaut, Valérie Gouranton m2r_resp@irisa.fr 1 Generalities Curriculum organization and structure Planning of the year Selection of core modules

More information

Governance and Management of Information Security

Governance and Management of Information Security Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information

More information

North Texas ISSA CISO Roundtable

North Texas ISSA CISO Roundtable North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton

More information

Specialist Cloud Services. Acumin Cloud Security Resourcing

Specialist Cloud Services. Acumin Cloud Security Resourcing Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting

More information

Information Security Program CHARTER

Information Security Program CHARTER State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information

More information

CASS Europe MBA Healthcare Management Specialization. Program Structure. Individual Module description. Type of course unit (compulsory, optional):

CASS Europe MBA Healthcare Management Specialization. Program Structure. Individual Module description. Type of course unit (compulsory, optional): CASS Europe MBA Healthcare Management Specialization Program Structure First Semester Core Modules Class Hours ECTS* Credits Fundamentals of Healthcare Management 45 6 Fundamentals of Public Health 45

More information

Managing e-health data: Security management. Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: mnyssen@vub.ac.

Managing e-health data: Security management. Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: mnyssen@vub.ac. Managing e-health data: Security management Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: mnyssen@vub.ac.be Structure of the presentation Data management: need for a clear

More information

National Certificate in Casino Surveillance (Supervisor) (Level 5)

National Certificate in Casino Surveillance (Supervisor) (Level 5) NQF Ref 0407 Version 2 Page 1 of 6 National Certificate in Casino Surveillance (Supervisor) (Level 5) Level 5 Credits 80 Purpose The National Certificate in Casino Surveillance (Supervisor) (Level 5) [Ref:

More information

Master informatique 2 e année Spécialité Recherche en informatique - MRI

Master informatique 2 e année Spécialité Recherche en informatique - MRI Master informatique 2 e année Spécialité Recherche en informatique - MRI http://master.irisa.fr Welcome presentation 2014-2015 Sandrine Blazy, Valérie Gouranton, m2r_resp@irisa.fr 1 Outline Generalities

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/

USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/ SECTION 23 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 23 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate

More information

Cybersecurity and the AICPA Cybersecurity Attestation Project

Cybersecurity and the AICPA Cybersecurity Attestation Project Cybersecurity and the AICPA Cybersecurity Attestation Project Chris Halterman Executive Director EY Chair AICPA Trust Information Integrity Task Force 2 October 2015 Increasing awareness of cybersecurity

More information

The Johns Hopkins University School of Medicine Calendar 2015-2016 (all dates are inclusive)

The Johns Hopkins University School of Medicine Calendar 2015-2016 (all dates are inclusive) V1: 03//15 The Johns opkins University School Medicine Calendar 2015-2016 (all dates are inclusive) 2015 August 3 Monday. Instruction begins for First Year Medical and Biological Illustration Graduate

More information

TIPA : services based on standards

TIPA : services based on standards JOURNEE MONDIALE DE LA NORMALISATION Les normes garantissent des changement positifs 14 octobre 2013 TIPA : services based on standards Béatrix.Barafort@tudor.lu What is TIPA? TIPA: Tudor IT Assessment

More information

TRAINING BROCHURE 2015

TRAINING BROCHURE 2015 CHAMBER CERTIFICATION ASSESSMENT SERVICES LIMITED TRAINING BROCHURE 2015 For the last 20 years, Chamber Certification Assessment Services Limited has been providing highly professional, quality training

More information

Privacy and Security Risk Management Framework

Privacy and Security Risk Management Framework Owner: CISO/CIPO Version: 1.0 Release date: 2015-07-16 Next review: 2016-07 Security classification: Public Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development

More information

Mr Ronald S Boster Acting Secretary Public Company Accounting Oversight Board 1666 K Street, NW USA-Washington, DC 20006-2803.

Mr Ronald S Boster Acting Secretary Public Company Accounting Oversight Board 1666 K Street, NW USA-Washington, DC 20006-2803. Date Secrétariat Fédération Rue de la Loi 83 Général des Experts 1040 Bruxelles 31 March 2003 Comptables Tél. 32 (0) 2 285 40 85 Européens Fax: 32 (0) 2 231 11 12 E-mail: secretariat@fee.be Mr Ronald S

More information

Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice

Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice 1 Introduction 1.1 Buckinghamshire County Council (BCC) Transportation Service has Automatic Number Plate Recognition

More information

ISE Northeast Executive Forum and Awards

ISE Northeast Executive Forum and Awards ISE Northeast Executive Forum and Awards October 3, 2013 Company Name: Project Name: Presenter: Presenter Title: University of Massachusetts Embracing a Security First Approach Larry Wilson Chief Information

More information

M NCPA FACTS ABOUT THE CPA EXAM AND CERTIFICATION

M NCPA FACTS ABOUT THE CPA EXAM AND CERTIFICATION M NCPA FACTS ABOUT THE CPA EXAM AND CERTIFICATION 2015/2016 CPA CERTIFICATION THE FUTURE IS SO BRIGHT THE CPA CREDENTIAL WHY IT S IMPORTANT CPAs are taking care of business in every industry and there

More information

LEGAL PROFESSION (LEGAL PRACTICE MANAGEMENT COURSE) RULES 2015

LEGAL PROFESSION (LEGAL PRACTICE MANAGEMENT COURSE) RULES 2015 LEGAL PROFESSION (LEGAL PRACTICE MANAGEMENT COURSE) RULES 2015 S.L. 31 of 2015 Presented to Parliament pursuant to section 185 of the Legal Profession Act. Ordered by Parliament to lie upon the Table:

More information

Call for papers. Experiential marketing applied to watchmaking

Call for papers. Experiential marketing applied to watchmaking 7 th Journée de Recherche sur Marketing Horloger (JRMH) (Symposium of Applied Research on Watchmaking Marketing) www.marketinghorloger.ch Call for papers The Association des Journées Internationales du

More information

Master of Communication Studies New Media and Society in Europe

Master of Communication Studies New Media and Society in Europe Master of Communication Studies New Media and Society in Europe A one-year programme in English focusing on one of the most dynamic sectors in Europe. Master of Communication Studies The Master of Communication

More information

2015-2016 Academic Calendar - UNDERGRADUATE. All Other Classes Begin; Late Registration Begins. Last Day to Drop a Class without a W on Transcript;

2015-2016 Academic Calendar - UNDERGRADUATE. All Other Classes Begin; Late Registration Begins. Last Day to Drop a Class without a W on Transcript; 2015-2016 Academic Calendar - UNDERGRADUATE Fall 2015 Semester Monday, August 10 Friday, August 14 Saturday, August 15 Monday, August 17 Friday, August 21 Friday, August 28 Friday, September 4 Monday,

More information

PRACTICAL INFORMATION

PRACTICAL INFORMATION International Conference ARCHITECTURAL POLICIES 2.0 Rethinking built environment policy making in Europe Luxembourg, 12-13 November 2015 Date and venue Conference ARCHITECTURAL POLICIES 2.0 - Rethinking

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

Pinning and Graduation Ceremony at St. Aloysius. Fall Semester and Term B Classes End. St Francis School of Radiography Seniors Spring Semester

Pinning and Graduation Ceremony at St. Aloysius. Fall Semester and Term B Classes End. St Francis School of Radiography Seniors Spring Semester 2015 2016 Academic Calendar Fall Session 2015 Saturday, August 15 Monday, August 31 Monday, August 31 Friday, September 4 Monday, September 7 Friday, October 9 Tuesday, October 20 Wednesday, October 21

More information

Investment Funds. Professional Qualification in. Professional Qualification

Investment Funds. Professional Qualification in. Professional Qualification Professional Qualification in Investment Funds Professional Qualification Luxembourg is recognized as a centre of excellence for the domiciliation and the administration of investment funds. The ever growing

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

Security Audit VIS Central System. Summary Report

Security Audit VIS Central System. Summary Report Security Audit VIS Central System Summary Report 1 June 2012 1 1. INTRODUCTION 1.1 Visa information system The Visa Information System (VIS) is a system for the exchange of data on short-stay visas among

More information

USF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/

USF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/ SECTION 18 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 18 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate

More information

States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent

States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent SESSION ID: PNG-R04 States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent MODERATOR: Christopher Ipsen CIO Nevada Desert Research Institute PANELISTS: Tim Hastings Chief Information

More information

4 WEEK SUMMER PROGRAM - PARIS

4 WEEK SUMMER PROGRAM - PARIS 4 WEEK SUMMER PROGRAM - PARIS Intensive French Language Course + Fashion & Luxury Goods Marketing The French Wine Business French Culture & Identity International Business and Management School - Paris

More information

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1 The International

More information

6-8, avenue Blaise Pascal Cité Descartes Champs-sur-Marne 77455 Marne-la-Vallée Cedex 2

6-8, avenue Blaise Pascal Cité Descartes Champs-sur-Marne 77455 Marne-la-Vallée Cedex 2 200 avenue de la République 92001 Nanterre Cedex Secrétariat : Mme Bertoni Tél. : 01 40 97 73 93 Fax : 01 40 97 71 56 6-8, avenue Blaise Pascal Cité Descartes Champs-sur-Marne 77455 Marne-la-Vallée Cedex

More information

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13 Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...

More information

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS MEHARI 2007 Overview Methods Commission Mehari is a trademark registered by the Clusif CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Semard, 75009 PARIS Tél.: +33 153 25 08 80 - Fax: +33

More information

Our Commitment to Information Security

Our Commitment to Information Security Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as

More information

Request for Proposal: Development of a Guide to International Standards on Auditing for Use in Audits of Small- and Medium-sized Entities

Request for Proposal: Development of a Guide to International Standards on Auditing for Use in Audits of Small- and Medium-sized Entities Small and Medium Practices Permanent Task Force September 7, 2005 Request for Proposal: Development of a Guide to International Standards on Auditing for Use in Audits of Small- and Medium-sized Entities

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Document Hierarchy of Information Security. Corporate Security Policy. Information Security Standard. General Directive(s) Specific Directive(s)

Document Hierarchy of Information Security. Corporate Security Policy. Information Security Standard. General Directive(s) Specific Directive(s) Document Hierarchy of Information Security General commitment to Information Security Installation of CorpSec Enabling CSO Installing Information Security Standard Corporate Security Policy Defining Assets,

More information

Security & Privacy Friends, Foes or Partners?

Security & Privacy Friends, Foes or Partners? Security & Privacy Friends, Foes or Partners? How To Develop a Global Privacy Compliance Strategy and Implementation Program Thursday, February 12 Rebecca Whitener, EDS Fellow (919) 645-1902 rebecca.whitener@eds.com

More information

Graduate Certificate in Internal Auditing

Graduate Certificate in Internal Auditing Graduate Certificate in Internal Auditing Your gateway to a rewarding career in Internal Auditing About IIA-Australia The Institute of Internal Auditors Australia is the leading body representing internal

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority Cloud Security Standards Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority Introduction Sign Off December 2012 Information Technology Authority

More information

CYBERSECURITY EXAMINATION SWEEP SUMMARY

CYBERSECURITY EXAMINATION SWEEP SUMMARY This Risk Alert provides summary observations from OCIE s examinations of registered broker-dealers and investment advisers, conducted under the Cybersecurity Examination Initiative, announced April 15,

More information

Master of Science (MSc) in Facility Management

Master of Science (MSc) in Facility Management : : mscfm Master of Science (MSc) in Facility Management Bringing International FM to Life Simon Ashworth Zurich University of Applied Sciences ZHAW 1 Agenda What is Facility Management (FM)? What are

More information

Master Programme in Customs & Supply Chain Compliance

Master Programme in Customs & Supply Chain Compliance Delft TopTech Study load The degree covers at least 60 credits within the European Credit Transfer and Accumulation System (ECTS). One credit corresponds to 28 hours of study. The programme is offered

More information

La Trobe Law Students Association. First Year Representative Position Description

La Trobe Law Students Association. First Year Representative Position Description La Trobe Law Students Association First Year Representative Position Description 2015 Important Dates: Nominations Friday 20 th March, 2015 Thursday 2 nd April, 2015 New Committee Announced: by Wednesday

More information

3000_115 Competency Standard: Certified Practitioner in Asset Management (CPAM)

3000_115 Competency Standard: Certified Practitioner in Asset Management (CPAM) 3000_115 Competency Standard: Certified Practitioner in Asset Management (CPAM) Asset Management Council GENERAL Holders of this certificate will have an understanding of the contribution that they make

More information

GENERAL COURSE INFORMATION 2013-2014

GENERAL COURSE INFORMATION 2013-2014 GENERAL COURSE INFORMATION 2013-2014 Welcome to Toulouse Business School MSc Program International Relations Office 1 Table of contents : Course Information... 3 MASTER 1 Semester 1 (Fall) International

More information

Domestic Regulation and Professional Services

Domestic Regulation and Professional Services Domestic Regulation and Professional Services OECD-World Bank Services Experts Paris Meeting, 16 Feb. 2007 FEE - Olivier Boutellis-Taft, CEO European Federation of Accountants Fédération des Experts Comptables

More information

RISK. Outsourcing Risk Management How to Focus on Controlling and Managing IT Vendors under RBI Guidelines

RISK. Outsourcing Risk Management How to Focus on Controlling and Managing IT Vendors under RBI Guidelines August 31 September 2, 2015 Programme on Outsourcing Risk Management How to Focus on Controlling and Managing IT Vendors under RBI Guidelines Coordinator Prof Sunil Bakshi RISK National Institute of Bank

More information

Request for Proposal Research

Request for Proposal Research Governance of Master Data Structured and Unstructured INTRODUCTION AND INSTRUCTIONS The Institute of Internal Auditors Research Foundation (IIARF) is the global leader in providing research and knowledge

More information

Manager Relocation Services

Manager Relocation Services Manager Relocation Services The Crestbridge Limited affiliation is regulated by the Jersey Financial Services Commission. Crestbridge S.A. and Crestbridge Management Company S.A. are regulated by the Commission

More information

BY LAW 4 CONCERNING COLLEGE ADMISSION

BY LAW 4 CONCERNING COLLEGE ADMISSION BY LAW 4 CONCERNING COLLEGE ADMISSION This By law was adopted for the first time by Resolution Number 013 12 on April 29, 1971 and subsequently amended by Resolution: 041 19 October 9, 1973 066 16 February

More information

MEHARI 2010. Overview. April 2010. Methods working group. Please post your questions and comments on the forum: http://mehari.

MEHARI 2010. Overview. April 2010. Methods working group. Please post your questions and comments on the forum: http://mehari. MEHARI 2010 Overview April 2010 Methods working group Please post your questions and comments on the forum: http://mehari.info/ CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30 rue Pierre Sémard, 75009

More information

www.pwc.com Developing a robust cyber security governance framework 16 April 2015

www.pwc.com Developing a robust cyber security governance framework 16 April 2015 www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October

More information

NEEDS AND DISABILITIES MA ND DISABILITIES MA SPECIAL ECIAL EDUCATIONAL NEEDS AL NEEDS AND DISABILITIES S MA SPECIAL EDUCATIONAL

NEEDS AND DISABILITIES MA ND DISABILITIES MA SPECIAL ECIAL EDUCATIONAL NEEDS AL NEEDS AND DISABILITIES S MA SPECIAL EDUCATIONAL PECIAL EDUCATIONAL NEEDS NEEDS AND DISABILITIES MA ND DISABILITIES MA SPECIAL ECIAL EDUCATIONAL NEEDS AL NEEDS AND DISABILITIES S MA SPECIAL EDUCATIONAL FACULTY OF EDUCATION AND CHILDREN S SERVICES ACADEMIC

More information

Master of Science Industrial Engineering and Operations Research

Master of Science Industrial Engineering and Operations Research FACULTY OF ENGINEERING AND ARCHITECTURE Master of Science Industrial Engineering and Operations Research Some useful information for (new) students Prof. Stijn De Vuyst, Prof. Birger Raa Monday 22 september

More information

A guide for Small and Medium Enterprises (SMEs) in or facing financial difficulties

A guide for Small and Medium Enterprises (SMEs) in or facing financial difficulties banking only better A guide for Small and Medium Enterprises (SMEs) in or facing financial difficulties An information booklet brought to you by permanent tsb Are you in arrears or is your business facing

More information

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At

More information

Fall Flex 2013 Supplemental

Fall Flex 2013 Supplemental Fall Flex 2013 Supplemental The following flex calendar is for all teachers of Rancho Santiago Community College Continuing Education Programs. In September, faculty will receive an update of flex activities

More information

The Magazine for IT Security. May 2010. issue 3. sör alex / photocase.com

The Magazine for IT Security. May 2010. issue 3. sör alex / photocase.com The Magazine for IT Security May 2010 sör alex / photocase.com free digital version made in Germany issue 3 Luiz Fotolia.com Clouds or storm clouds? Cloud Computing Security by Javier Moreno Molinero Gradually,

More information