Information session April 2nd, Master 2 in Information System Security Management (ISSM)

Size: px
Start display at page:

Download "Information session April 2nd, 2015. Master 2 in Information System Security Management (ISSM)"

Transcription

1 Information session April 2nd, 2015 Master 2 in Information System Security Management (ISSM)

2 Master s team Prof. Yves Le Traon Study director Rita Giannini Study coordinator

3 Master s team Nicolas Mayer Study director Bahija Sebane Training officer Chrystel Petiteville Training assistant

4 Other actors CLUb de la Sécurité des Systèmes d'information Luxembourgeois Portail de la sécurité de l'information du Ministère de l'economie et du Commerce extérieur Collège des Professionnels de la Sécurité de l Information Commission de Surveillance du Secteur Financier

5 Motivation Business relies on information systems The availability of these systems becomes critical The number of security incidents is growing rapidly Security management is now crucial Legal and regulatory constraints are arising Then Needs for training information security professionals and experts! Requires advanced and diverse competencies

6 Public Consultants / auditors Business owner CISO (Chief Information Security Officer) Professional people responsible for information security IT engineers, IT Managers Related Professions (Lawers, cybercops, etc.) Big companies SMEs administrations Financial sector Health sector Industries Public sector Other sectors

7 Objective Train experienced professionals to give skills of the chief information security officer (CISO)

8 The CISO (Chief Information Security Officer) Corporate Executive A job that deals with the whole organisation «Compliance» department «Risk Management» department IT department User services

9 Interdisciplinary training Legislation and regulation Security standards Security Audit Methodologies For information security Organisation Technologies For securing information and systems Enterprise management Project management Risk Management Security management

10 Program

11 Program Module 1 - Understanding organisations and management 9 ECTS Course hours Organisational theory and change 12 Architecture and business strategy 18 Financial Management 6 Project Management 12 IT Service Management 6 TOTAL 54

12 Program Module 2 Regulatory frameworks 8 ECTS Course hours Legal and regulatory aspects 18 Law enforcement 12 Special businesses and impacts 18 TOTAL 48

13 Program Module 3 Information Security Management 12 ECTS Course hours Information Security Management System ISMS 12 Risk analysis practices 6 Risk analysis and management 12 Electronic records management 12 Security Policy 12 Compliance Assurance 12 Business Continuity Management 6 TOTAL 72

14 Program Module 4 Technical aspects 12 ECTS Course hours Information Security Technologies 1 12 Information Security Technologies 2 12 Communication, information processing and persistence 1 Communication, information processing and persistence 2 Threats, attacks and controls TOTAL 72

15 Program Module 5 Human aspects 4 ECTS Course hours Human risk 12 Human communication 12 TOTAL 24

16 Program Module 6 Professional part 15 ECTS Course hours Working in information security management 6 Professional project n/a

17 ISED Information Security Education Day 2015 Theme: Understanding Data Protection challenges The ISED is an event that aims providing each year new knowledge on a hot-topic related to security and privacy. Primarily it targets the current and former students of the professional (Master en management de la sécurité des systèmes d'information). However the ISED also provides an ideal forum where academics and practitioners can learn about the different facets of a key-topic, exchange, discuss ideas, and compare experiences. Friday 22nd May 2015

18 Program = 6 modules 1 9 ECTS Understanding organisations and management 8 ECTS Regulatory frameworks ECTS Professional part 12 ECTS Information security Management ECTS Human aspects 12 ECTS Technical aspects 4

19 Schedule Understanding organisations and management Regulatory frameworks Information security Management Technical aspects Working in information security management Human aspects Professional part semester 1 semester 2 semester 3 semester 4 60 ECTS

20 1st promotion

21 Professional discussions in a good atmosphere!

22 Practical information Calendar 276 hours: academic courses In english Two academic years, in 20/25 sessions of 2 consecutive days Friday and Saturday from 9.00 a.m. to 5.30 p.m. The exact schedule is given at the beginning of each semester 4 to 6 months: professional project Place CRP Henri Tudor on Fridays Université du Luxembourg on Saturdays Fees: 4600 * including Registration at the University of Luxembourg Training fees * FEES MAY CHANGE Electronic communication tool Moodle Course start date September 18th, 2015

23 Registration 1/ Preselection application: April 24th - Resumé + cover letter + letter from employer if possible Minimum requirement = BAC+4 level (or 3 years of experience for each missing year) and a background/experience in IT 2/ Interview: TBD 3/ Final registration online via management_de_la_securite_des_systemes_d_information_professionnel 4/ Course start date: September 18th, 2014

24 Contact Rita Giannini

AND. Course Offer for 2015-2016 Exchange Students BBA - Bachelor International 2 nd Year Non Double Degree (NDD) BBA 2 nd Year (NDD)

AND. Course Offer for 2015-2016 Exchange Students BBA - Bachelor International 2 nd Year Non Double Degree (NDD) BBA 2 nd Year (NDD) nd Non Double Degree (NDD) BBA nd (NDD) Fall - SEM (September - December) Language ECTS BBA- nd French RHMGRHLF003 Leadership et Management French 4 STRSTRLF008 Techniques du Commerce International French

More information

FEE Qualification and Market Access Working Party

FEE Qualification and Market Access Working Party FEE Qualification and Market Access Working Party Structure and Organisation of the Accountancy Profession Key features Luxembourg Status: March 2012 Contact persons: Guay Michel, IRE, e-mail: mguay@ire.lu

More information

Master in Accounting and Audit. Master académique

Master in Accounting and Audit. Master académique Master in Accounting and Audit Master académique " A research centered university with a personal atmosphere and multicultural flair " Students at the University of Luxembourg 2 1 " an international, dynamic

More information

Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG

Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG 11:30 am -12:15 pm Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG Agenda Introduction 20 Questions you should

More information

Politique de sécurité de l information Information Security Policy

Politique de sécurité de l information Information Security Policy Politique de sécurité de l information Information Security Policy Adoptée par le Conseil d administration Le 10 novembre 2011 Adopted by the Board of Directors on November 10, 2011 Table of contents FOREWORD

More information

Master of Science in Information Assurance

Master of Science in Information Assurance 2004-2005 Catalog Addendum New Program Master of Science in Information Assurance This Walsh College Master of Science in Information Assurance degree combines theory with applied learning enabling security

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

Academic Calendar 2015-2016

Academic Calendar 2015-2016 Academic Calendar 2015-2016 Fall 2015 - Full/TCAT Session August 24, 2015 - December 10, 2015 Fall 2015-1st Session August 24, 2015 - October 9, 2015 Fall 2015-2nd Session October 14, 2015 - December 10,

More information

Master in Mathematics

Master in Mathematics Master in Mathematics Master académique General Mathematics Financial Mathematics The numbers of left and right spirals of a sunflower are consecutive numbers of the Fibonacci sequence 0, 1, 1, 2, 3, 5,

More information

Question: 1 Which of the following should be the FIRST step in developing an information security plan?

Question: 1 Which of the following should be the FIRST step in developing an information security plan? 1 ISACA - CISM Certified Information Security Manager Exam Set: 1, INFORMATION SECURITY GOVERNANCE Question: 1 Which of the following should be the FIRST step in developing an information security plan?

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Specialist Cloud Services. Acumin Cloud Security Resourcing

Specialist Cloud Services. Acumin Cloud Security Resourcing Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Information security risk management using ISO/IEC 27005:2008

Information security risk management using ISO/IEC 27005:2008 Information security risk management using ISO/IEC 27005:2008 Hervé Cholez / Sébastien Pineau Centre de Recherche Public Henri Tudor herve.cholez@tudor.lu sebastien.pineau@tudor.lu March, 29 th 2011 1

More information

Revised October 2013

Revised October 2013 Revised October 2013 Version 3.0 (Live) Page 0 Owner: Chief Examiner CONTENTS: 1. Introduction..2 2. Foundation Certificate 2 2.1 The Purpose of the COBIT 5 Foundation Certificate.2 2.2 The Target Audience

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

Smart DCC Ltd Information Security Policy. Version: 3.0

Smart DCC Ltd Information Security Policy. Version: 3.0 Version: 3.0 Date: 14 July 2015 Classification: DCC Public 1 Introduction 1.1 This (ISP) defines the (Smart DCC) approach to information security. An effective ISP provides a sound basis for defining and

More information

Adopt the following: Section A

Adopt the following: Section A Grand-Ducal Regulation of 9 July 2013 determining the requirements for the professional qualification of Réviseur d Entreprises pursuant to the Law of 18 December 2009 on the audit profession We Henri,

More information

Information Security Management Systems

Information Security Management Systems Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector

More information

Table of Contents. 1. Organisation and Management (5 ECTS) 1.1. Management

Table of Contents. 1. Organisation and Management (5 ECTS) 1.1. Management Table of Contents 1. Organisation and Management (5 ECTS)...1 1.1. Management...1 1.2. Personnel Management...2 1.3. Recruitment and Selection...2 1.4. Information Management...2 1.5. Career Planning...2

More information

Under the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems

Under the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems Under the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems The Research Group on QHSE Sidi Mohamed Ben Abdellah

More information

Information Security Program CHARTER

Information Security Program CHARTER State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information

More information

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course Achieving Governance, Risk and Compliance Requirements with HISP Certification Course in corporation with A unique information security and regulatory compliance certification course that provides IT security

More information

3 STAGE PUBLIC PROGRAMS PROFESSIONAL NEGOTIATION & INFLUENCING PROGRAM. g Negotiate with confidence g Do deals that deliver g Get what YOU want

3 STAGE PUBLIC PROGRAMS PROFESSIONAL NEGOTIATION & INFLUENCING PROGRAM. g Negotiate with confidence g Do deals that deliver g Get what YOU want 3 STAGE PUBLIC PROGRAMS PROFESSIONAL NEGOTIATION & INFLUENCING PROGRAM g Negotiate with confidence g Do deals that deliver g Get what YOU want THE ENS INTERNATIONAL PROFESSIONAL NEGOTIATION AND INFLUENCING

More information

Governance and Management of Information Security

Governance and Management of Information Security Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information

More information

APPLICATION PROCEDURE FOR INCOMING STUDENTS

APPLICATION PROCEDURE FOR INCOMING STUDENTS INSEEC Bordeaux Application procedure for Incoming Students 2013-2014 APPLICATION PROCEDURE FOR INCOMING STUDENTS Dear Colleagues, The application period 2013-2014 for Incoming Students wishing to study

More information

ISO/IEC 27002 INTERNATIONAL STANDARD. Information technology Security techniques Code of practice for information security management

ISO/IEC 27002 INTERNATIONAL STANDARD. Information technology Security techniques Code of practice for information security management INTERNATIONAL STANDARD ISO/IEC 27002 First edition 2005-06-15 Information technology Security techniques Code of practice for information security management Technologies de l'information Techniques de

More information

National Certificate in Casino Surveillance (Supervisor) (Level 5)

National Certificate in Casino Surveillance (Supervisor) (Level 5) NQF Ref 0407 Version 2 Page 1 of 6 National Certificate in Casino Surveillance (Supervisor) (Level 5) Level 5 Credits 80 Purpose The National Certificate in Casino Surveillance (Supervisor) (Level 5) [Ref:

More information

QA Work Paper Analysis

QA Work Paper Analysis QA Work Paper Analysis Part 1 Summary Audit No. 1 Audit No. 2 Audit No. 3 Audit No. 4 Audit No. 5

More information

TRAINING BROCHURE 2015

TRAINING BROCHURE 2015 CHAMBER CERTIFICATION ASSESSMENT SERVICES LIMITED TRAINING BROCHURE 2015 For the last 20 years, Chamber Certification Assessment Services Limited has been providing highly professional, quality training

More information

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1 The International

More information

The problem of cloud data governance

The problem of cloud data governance The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in

More information

Cybersecurity and the AICPA Cybersecurity Attestation Project

Cybersecurity and the AICPA Cybersecurity Attestation Project Cybersecurity and the AICPA Cybersecurity Attestation Project Chris Halterman Executive Director EY Chair AICPA Trust Information Integrity Task Force 2 October 2015 Increasing awareness of cybersecurity

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

ISE Northeast Executive Forum and Awards

ISE Northeast Executive Forum and Awards ISE Northeast Executive Forum and Awards October 3, 2013 Company Name: Project Name: Presenter: Presenter Title: University of Massachusetts Embracing a Security First Approach Larry Wilson Chief Information

More information

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS MEHARI 2007 Overview Methods Commission Mehari is a trademark registered by the Clusif CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Semard, 75009 PARIS Tél.: +33 153 25 08 80 - Fax: +33

More information

Cybersecurity and the AICPA Cybersecurity Attestation Project

Cybersecurity and the AICPA Cybersecurity Attestation Project Cybersecurity and the AICPA Cybersecurity Attestation Project Chris Halterman Executive Director EY Chair AICPA Trust Information Integrity Task Force Agenda Item 8-D IAASB Meeting, September 21-25, 2015

More information

Managing e-health data: Security management. Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: mnyssen@vub.ac.

Managing e-health data: Security management. Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: mnyssen@vub.ac. Managing e-health data: Security management Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: mnyssen@vub.ac.be Structure of the presentation Data management: need for a clear

More information

-gain a unique insight into the history, politics, economics and cultural diversity of Latin America

-gain a unique insight into the history, politics, economics and cultural diversity of Latin America This specification provides a concise summary of the main features of the minor and the learning outcomes that a typical student might reasonably be expected to achieve and demonstrate if s/he takes full

More information

How the State of Florida Builds Information Security Expertise Despite Escalating Risk and Tight Budgets.

How the State of Florida Builds Information Security Expertise Despite Escalating Risk and Tight Budgets. September 2010 How the State of Florida Builds Information Security Expertise Despite Escalating Risk and Tight Budgets. CHALLENGE Training and education have always been a top priority for the State of

More information

USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/

USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/ SECTION 23 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 23 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate

More information

Information Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer

Information Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer Information Security Management Systems Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer atsec information security, 2013 ISO/IEC 27001 and related

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

Le pari des centres de compétences dans la stabilisation des organisations en phase post-projet ERP

Le pari des centres de compétences dans la stabilisation des organisations en phase post-projet ERP Systèmes d'information et Management Volume 16 Issue 1 Article 3 2011 Le pari des centres de compétences dans la stabilisation des organisations en phase post-projet ERP Guy Saint Léger Ecole Supérieure

More information

Testimony. Marilyn A. Pendergast, CPA. Chair, Ethics Committee. International Federation of Accountants (IFAC) before the

Testimony. Marilyn A. Pendergast, CPA. Chair, Ethics Committee. International Federation of Accountants (IFAC) before the Testimony of Marilyn A. Pendergast, CPA Chair, Ethics Committee International Federation of Accountants (IFAC) before the New York State Senate Higher Education Committee Kenneth P. LaValle, Chairman Public

More information

EU Financial Services Law: How Financial Institutions Meet Internal Governance and Risk Management Requirements?

EU Financial Services Law: How Financial Institutions Meet Internal Governance and Risk Management Requirements? Seminar EU Financial Services Law: How Financial Institutions Meet Internal Governance and Risk Management Requirements? Luxembourg, 9-10 November 2015 European Institute of Public Administration European

More information

www.pwc.ru/capital-markets Guide to listing of debt on European stock exchanges

www.pwc.ru/capital-markets Guide to listing of debt on European stock exchanges www.pwc.ru/capital-markets Guide to listing of debt on European stock exchanges 2 PwC A number of European stock exchanges have become major centres for listing debt securities. The London, Irish and Luxembourg

More information

Plovdiv workshop Day 1 Feb.21. Professionally-oriented practices and project-based learning Daniel TOUDIC Rennes 2 University

Plovdiv workshop Day 1 Feb.21. Professionally-oriented practices and project-based learning Daniel TOUDIC Rennes 2 University Plovdiv workshop Day 1 Feb.21 Professionally-oriented practices and project-based learning Daniel TOUDIC Rennes 2 University 1 Professionally-oriented practices 1. Outcomes of OPTIMALE work-package 5.3

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

Data Privacy Framework

Data Privacy Framework Data Privacy Framework Table of Contents 1. INTRODUCTION...4 2. SCOPE & DEFINITIONS...4 2.1 SCOPE OF THE DATA PRIVACY FRAMEWORK...4 2.2 DEFINITIONS...4 3. SECURITY ORGANIZATION & RESPONSIBILITIES...4 3.1

More information

Fund Services Intelligence

Fund Services Intelligence Fund Services Intelligence AIF & UCITS platforms Launching or transferring your vehicle Processing risk management Providing investment management Servicing your structure We look after regulatory tasks

More information

Mr Ronald S Boster Acting Secretary Public Company Accounting Oversight Board 1666 K Street, NW USA-Washington, DC 20006-2803.

Mr Ronald S Boster Acting Secretary Public Company Accounting Oversight Board 1666 K Street, NW USA-Washington, DC 20006-2803. Date Secrétariat Fédération Rue de la Loi 83 Général des Experts 1040 Bruxelles 31 March 2003 Comptables Tél. 32 (0) 2 285 40 85 Européens Fax: 32 (0) 2 231 11 12 E-mail: secretariat@fee.be Mr Ronald S

More information

Welcome presentation 2012-2013

Welcome presentation 2012-2013 http://master.irisa.fr Welcome presentation 2012-2013 Isabelle Puaut, Valérie Gouranton m2r_resp@irisa.fr 1 Generalities Curriculum organization and structure Planning of the year Selection of core modules

More information

Managing e-health data: Security management in practice

Managing e-health data: Security management in practice Managing e-health data: Security management in practice Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: mnyssen@vub.ac.be Structure of the presentation Practical approach towards

More information

Accounting and Auditing Standards Community of Practice (A&A CoP) STAREP ESTABLISHING APPROPRIATE AUDIT & ACCOUNTANCY OVERSIGHT SYSTEM IN AZERBAIJAN

Accounting and Auditing Standards Community of Practice (A&A CoP) STAREP ESTABLISHING APPROPRIATE AUDIT & ACCOUNTANCY OVERSIGHT SYSTEM IN AZERBAIJAN Accounting and Auditing Standards Community of Practice (A&A CoP) STAREP ESTABLISHING APPROPRIATE AUDIT & ACCOUNTANCY OVERSIGHT SYSTEM IN AZERBAIJAN Professional Public Oversight Organizations in Azerbaijan

More information

ISO/IEC 27002 INTERNATIONAL STANDARD. Information technology Security techniques Code of practice for information security management

ISO/IEC 27002 INTERNATIONAL STANDARD. Information technology Security techniques Code of practice for information security management INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 27002 First edition 2005-06-15 Information technology Security techniques Code of practice for information security

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

3000_115 Competency Standard: Certified Practitioner in Asset Management (CPAM)

3000_115 Competency Standard: Certified Practitioner in Asset Management (CPAM) 3000_115 Competency Standard: Certified Practitioner in Asset Management (CPAM) Asset Management Council GENERAL Holders of this certificate will have an understanding of the contribution that they make

More information

UK Permanent Salary Index - 2015

UK Permanent Salary Index - 2015 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 2013 2014 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation responsible

More information

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..

More information

Domestic Regulation and Professional Services

Domestic Regulation and Professional Services Domestic Regulation and Professional Services OECD-World Bank Services Experts Paris Meeting, 16 Feb. 2007 FEE - Olivier Boutellis-Taft, CEO European Federation of Accountants Fédération des Experts Comptables

More information

Cyber Security key emerging risk Q3 2015

Cyber Security key emerging risk Q3 2015 Cyber Security key emerging risk Q3 2015 The study is based on interviews with CIO:s, CISO:s and Head of Security in August and September 2015. November 2015 www.pwc.se Companies falling behind are more

More information

USF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/

USF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/ SECTION 18 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 18 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate

More information

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13 Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...

More information

Working Group on. First Working Group Meeting 29.5.2012

Working Group on. First Working Group Meeting 29.5.2012 Working Group on Cloud Security and Privacy (WGCSP) First Working Group Meeting 29.5.2012 1 Review of fexisting i Standards d and Best Practices on Cloud Security Security Standards and Status List of

More information

FORMATION CONTINUE RECHERCHE APPLIQUÉE OUTILS PÉDAGOGIQUES PUBLIC PERFORMANCE AUDIT TRAINING

FORMATION CONTINUE RECHERCHE APPLIQUÉE OUTILS PÉDAGOGIQUES PUBLIC PERFORMANCE AUDIT TRAINING FORMATION CONTINUE RECHERCHE APPLIQUÉE OUTILS PÉDAGOGIQUES PUBLIC PERFORMANCE AUDIT TRAINING PRESENTATION OF TRAINING The training includes a total of approximately 150 hours of teaching. Training sessions

More information

Master in Public Management and Policy (PMP) Specialisation in Public Management and Economics Specialisation in Public Communication

Master in Public Management and Policy (PMP) Specialisation in Public Management and Economics Specialisation in Public Communication Master in Public Management and Policy (PMP) Specialisation in Public Management and Economics Specialisation in Public Communication Agenda Why choose Università della Svizzera italiana () The specialisations

More information

States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent

States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent SESSION ID: PNG-R04 States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent MODERATOR: Christopher Ipsen CIO Nevada Desert Research Institute PANELISTS: Tim Hastings Chief Information

More information

North Texas ISSA CISO Roundtable

North Texas ISSA CISO Roundtable North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton

More information

ow to use CobiT to assess the security & reliability of Digital Preservation

ow to use CobiT to assess the security & reliability of Digital Preservation ow to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14-16 April 2004 Greet Volders Managing Consultant - VOQUALS N.V. Vice President & in charge of Education

More information

A guide for Small and Medium Enterprises (SMEs) in or facing financial difficulties

A guide for Small and Medium Enterprises (SMEs) in or facing financial difficulties banking only better A guide for Small and Medium Enterprises (SMEs) in or facing financial difficulties An information booklet brought to you by permanent tsb Are you in arrears or is your business facing

More information

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

AN OVERVIEW OF INFORMATION SECURITY STANDARDS AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

Master informatique 2 e année Spécialité Recherche en informatique - MRI

Master informatique 2 e année Spécialité Recherche en informatique - MRI Master informatique 2 e année Spécialité Recherche en informatique - MRI http://master.irisa.fr Welcome presentation 2014-2015 Sandrine Blazy, Valérie Gouranton, m2r_resp@irisa.fr 1 Outline Generalities

More information

Masterclass Cycle on Information Security Management

Masterclass Cycle on Information Security Management Masterclass Cycle on Information Security Management Season 2016 The Masterclass Cycle on Information Security Management is a truly European modular programme, co-created with the CIO community, that

More information

Self-Assessment of a Comprehensive Privacy Programme: A Tool for Practitioners

Self-Assessment of a Comprehensive Privacy Programme: A Tool for Practitioners Self-Assessment of a Comprehensive Privacy Programme: A Tool for Practitioners The Accountability Project ( the Project ) is pleased to release Self-Assessment of a Comprehensive Privacy Programme: A Tool

More information

TRAINING BROCHURE 2016

TRAINING BROCHURE 2016 NEW ISO 9001:2015 & 14001:2015 STANDARD TRAINING NEW ISO 9001:2015 AUDITOR TRANSITION TRAINING IRCA APPROVED FOUNDATION, INTERNAL AUDITOR AND LEAD AUDITOR TRAINING TRAINING BROCHURE 2016 CCAS has been

More information

Graduate Certificate in Internal Auditing

Graduate Certificate in Internal Auditing Graduate Certificate in Internal Auditing Your gateway to a rewarding career in Internal Auditing About IIA-Australia The Institute of Internal Auditors Australia is the leading body representing internal

More information

Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction

Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction Introduction In today s dynamic business environment, corporation s intangible

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Security & Privacy Friends, Foes or Partners?

Security & Privacy Friends, Foes or Partners? Security & Privacy Friends, Foes or Partners? How To Develop a Global Privacy Compliance Strategy and Implementation Program Thursday, February 12 Rebecca Whitener, EDS Fellow (919) 645-1902 rebecca.whitener@eds.com

More information

Request for Proposal Research

Request for Proposal Research Governance of Master Data Structured and Unstructured INTRODUCTION AND INSTRUCTIONS The Institute of Internal Auditors Research Foundation (IIARF) is the global leader in providing research and knowledge

More information

CASS Europe MBA Healthcare Management Specialization. Program Structure. Individual Module description. Type of course unit (compulsory, optional):

CASS Europe MBA Healthcare Management Specialization. Program Structure. Individual Module description. Type of course unit (compulsory, optional): CASS Europe MBA Healthcare Management Specialization Program Structure First Semester Core Modules Class Hours ECTS* Credits Fundamentals of Healthcare Management 45 6 Fundamentals of Public Health 45

More information

CSSF CIRCULAR 13/578. Re: Update of the general presentation of the Law of 18 December 2009 and regulations relating to the audit profession

CSSF CIRCULAR 13/578. Re: Update of the general presentation of the Law of 18 December 2009 and regulations relating to the audit profession COMMISSION DE SURVEILLANCE DU SECTEUR FINANCIER Luxembourg, 4 December 2013 To all entities subject to the public oversight of the audit profession by the CSSF CSSF CIRCULAR 13/578 Re: Update of the general

More information

RISK. Outsourcing Risk Management How to Focus on Controlling and Managing IT Vendors under RBI Guidelines

RISK. Outsourcing Risk Management How to Focus on Controlling and Managing IT Vendors under RBI Guidelines August 31 September 2, 2015 Programme on Outsourcing Risk Management How to Focus on Controlling and Managing IT Vendors under RBI Guidelines Coordinator Prof Sunil Bakshi RISK National Institute of Bank

More information

Request for Proposal: Development of a Guide to International Standards on Auditing for Use in Audits of Small- and Medium-sized Entities

Request for Proposal: Development of a Guide to International Standards on Auditing for Use in Audits of Small- and Medium-sized Entities Small and Medium Practices Permanent Task Force September 7, 2005 Request for Proposal: Development of a Guide to International Standards on Auditing for Use in Audits of Small- and Medium-sized Entities

More information

Records and Document Management

Records and Document Management Records and Document Management Policy P3 Current: Updated November 2011 Table of Contents Purpose... 3 Scope... 3 Definitions... 3 Policy statement... 4 Responsibility... 4 Legislative context... 5 Associated

More information

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority Cloud Security Standards Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority Introduction Sign Off December 2012 Information Technology Authority

More information

The Johns Hopkins University School of Medicine Calendar 2015-2016 (all dates are inclusive)

The Johns Hopkins University School of Medicine Calendar 2015-2016 (all dates are inclusive) V1: 03//15 The Johns opkins University School Medicine Calendar 2015-2016 (all dates are inclusive) 2015 August 3 Monday. Instruction begins for First Year Medical and Biological Illustration Graduate

More information

OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON

OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON PERIODIC INFORMATION SECURITY AND PENETRATION AUDITS OF THE EXECUTIVE BRANCH INFORMATION TECHNOLOGY SYSTEMS JULY 2016 SUBMITTED TO THE TWENTY-EIGHTH

More information

Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice

Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice 1 Introduction 1.1 Buckinghamshire County Council (BCC) Transportation Service has Automatic Number Plate Recognition

More information

BY LAW 4 CONCERNING COLLEGE ADMISSION

BY LAW 4 CONCERNING COLLEGE ADMISSION BY LAW 4 CONCERNING COLLEGE ADMISSION This By law was adopted for the first time by Resolution Number 013 12 on April 29, 1971 and subsequently amended by Resolution: 041 19 October 9, 1973 066 16 February

More information

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA

More information

Manager des Systèmes d'information (M2) 2015 2016

Manager des Systèmes d'information (M2) 2015 2016 Codes modules Modules Codes matières Matières Manager des Systèmes d'information (M2 2015 2016 Nb h de cours / Tutorat Travail personnel / en groupe Contrôle continu Evaluation Evaluation finale Crédits

More information

Richard Gadsden Information Security Office Office of the CIO Information Services

Richard Gadsden Information Security Office Office of the CIO Information Services Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO Information Services Sharon Knowles Information Assurance Compliance MUSC Medical Center

More information

www.pwc.com Developing a robust cyber security governance framework 16 April 2015

www.pwc.com Developing a robust cyber security governance framework 16 April 2015 www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October

More information

State of Minnesota. Enterprise Security Program Policy. Office of Enterprise Technology. Enterprise Security Office Policy. Version 1.

State of Minnesota. Enterprise Security Program Policy. Office of Enterprise Technology. Enterprise Security Office Policy. Version 1. State of Minnesota Enterprise Security Program Policy Office of Enterprise Technology Version 1.00 Approval: Gopal Khanna (Signature on file with the ESO) 06/22/2009 State Chief Information Officer Signature

More information

French 10 September - 07 December, 2012

French 10 September - 07 December, 2012 French Regular 1, Section 0 Language and Communication Programme French 10 September - 07 December, 2012 F201/0 French Regular 1, Section 1 F201/1 French Regular 1, Section 3 F201/3 French Regular 1, Section

More information

ICA60208 Advanced Diploma of Information Technology (Network Security)

ICA60208 Advanced Diploma of Information Technology (Network Security) ICA60208 Advanced Diploma of Information Technology (Network Security) Release: 1 ICA60208 Advanced Diploma of Information Technology (Network Security) Modification History Not Applicable Approved Page

More information

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: OCCUPATIONAL GROUP: Information Technology CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: This family of positions provides security and monitoring for the transmission of information in voice, data,

More information

TIPA : services based on standards

TIPA : services based on standards JOURNEE MONDIALE DE LA NORMALISATION Les normes garantissent des changement positifs 14 octobre 2013 TIPA : services based on standards Béatrix.Barafort@tudor.lu What is TIPA? TIPA: Tudor IT Assessment

More information