Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP

Size: px
Start display at page:

Download "Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup."

Transcription

1 Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP

2 DA!

3 (by Global knowledge & TechRepublic)

4 Top certifications by salary:

5 CISM? CISA? CRISC? CISSP? CZYZXV?

6 ISACA Information Systems Audit and Control Association ISACA s membership more than 100,000 strong worldwide more than 180 countries and cover a variety of professional IT-related positions IS auditor, consultant, educator, IS security professional, regulator, chief information officer and internal auditor. ISACA has more than 190 chapters established in over 75 countries worldwide, and those chapters provide members education, resource sharing, advocacy, professional networking and a host of other benefits on a local level.

7 ISACA:

8 COBIT 5 is the latest edition of ISACA s globally accepted framework that helps enterprises of all sizes: Maintain high-quality information to support business decisions Achieve strategic goals and realize business benefits through the effective and innovative use of IT Achieve operational excellence through reliable, efficient application of technology Maintain IT-related risk at an acceptable level Optimize the cost of IT services and technology Support compliance with relevant laws, regulations, contractual agreements and policies

9 CRISC Certified in Risk and Information Systems Control Successful completion of the CRISC examination Work experience - risk management and information systems control experience (3 years experience in at least 3 CRISC domains) Adherence to the Code of Professional Ethics Adherence to the Continuing Professional Education Policy (120 CPE hours in 3 years) Submit an Application for CRISC certification

10 CRISC job practice areas 1. Risk Identification, Assessment and Evaluation (31%) 2. Risk Response (17%) 3. Risk Monitoring (17%) 4. Information Systems Control Design and Implementation (17%) 5. IS Control Monitoring and Maintenance (18%)

11 CISM Certified Information Security Manager Successfully pass the CISM exam. Work experience - 5 years of information security work experience, with 3 years of information security management work experience in at least 3 CISM domains Adhere to ISACA's Code of Professional Ethics. Agree to comply with the Continuing Education Policy (120 CPE hours in 3 years) Submit an Application for CISM Certification.

12 CISM job practice areas 1. Information Security Governance (24%) 2. Information Risk Management and Compliance (33%) 3. Information Security Program Development and Management (25%) 4. Information Security Incident Management (18%)

13 CISA Certified Information Systems Auditor Successful completion of the CISA examination Work experience - 5 years of professional information systems auditing, control or security work experience in the CISA job practice areas Adherence to the Code of Professional Ethics Adherence to the Continuing Professional Education Policy (120 CPE hours in 3 years) Compliance with the Information Systems Auditing Standards Submit an Application for CISA Certification

14 CISA job practice areas 1. The process of auditing information systems (14%) 2. Governance and management of IT (14%) 3. Information systems acquisition, development and implementation (19%) 4. Information systems operations, maintenance and support (23%) 5. Protection of Information Assets (30%)

15 (ISC)2 - International Information Systems Security Certification Consortium Headquartered in the United States and with offices in London, Hong Kong and Tokyo, (ISC)² is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. Provides vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 135 countries an elite network of nearly 75,000 certified industry professionals worldwide.

16 (ISC)2:

17 CISSP - Certified Information Systems Security Professional 1. Obtain the Required Experience (5 years in at least 2 of 10 CISSP domains, or 4 years and a college degree) 2. Study for the Exam 3. Register for the CISSP Exam 4. Pass the Exam 5. Complete the Endorsement Process 6. Maintain the CISSP Certification (120 CPE hours in 3 years) 7. Audit

18 CISSP knowledge domains 1. Access Control 2. Telecommunications and Network Security 3. Information Security Governance and Risk Management 4. Software Development Security 5. Cryptography 6. Security Architecture and Design 7. Operations Security 8. Business Continuity and Disaster Recovery Planning 9. Legal, Regulations, Investigations and Compliance 10. Physical (Environmental) Security

19 Certification fees ISACA s CISA, CISM and CRISC: USD 445 / 595 examination fee + USD 40 / 85 annual maintenance fee (ISC)2 s CISSP: EUR 520 examination fee + USD 85 annual maintenance fee

20 Exams CRISC, CISM, CISA: paper based 4 hours 200 multiple choice questions only twice a year, in June and December, at the same day in all exam locations CISSP computer based testing (Pearson VUE) 6 hours 250 multiple choice questions

21 Ostendo Consulting offers Exam Preparation Courses: CISA Sarajevo, /2012. CISM Sarajevo, /2012. CRISC Zagreb, /2012. CISSP Zagreb, /2012. Official COBIT 5 introduction course: Zagreb,

22 HVALA NA PAŽNJI!

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP All about CPEs David Gittens CISA CISM CISSP CRISC HISP The Designer David Gittens ISSA Barbados Past President Certified in ethical hacking and computer forensics Certified in security management and

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

Experienced professionals may apply for the Certified Risk Management Professional (CRMP) certification under the grandfathering provision.

Experienced professionals may apply for the Certified Risk Management Professional (CRMP) certification under the grandfathering provision. Application for CRMP Certification (part 1) GRCSI is now offering the Certified Risk Management Professional (CRMP) certification to support and recognize professionals who have skills and experience in

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

Please feel free to call on our organizations if we can be of assistance in any way on further deliberations, task forces or committees.

Please feel free to call on our organizations if we can be of assistance in any way on further deliberations, task forces or committees. 17 May 2012 International Internal Audit Standards Board Via e-mail: Lily.Bi@theiia.org Re: Definition of Internal Auditing Ms. Lily Bi, CIA, CISA, CGEIT Director, Standards and Guidance The Institute

More information

Terms of Reference for an IT Audit of

Terms of Reference for an IT Audit of National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor

More information

Information Security Principles and Practices

Information Security Principles and Practices Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,

More information

The Value of Information Security Certifications

The Value of Information Security Certifications The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials

More information

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1 The International

More information

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013 Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

A Business Framework for the Governance and Management of Enterprise IT

A Business Framework for the Governance and Management of Enterprise IT A Business Framework for the Governance and Management of Enterprise IT These following pages provide a preview of the information contained in COBIT 5. The COBIT 5 framework is available as a complimentary

More information

IT Audit and IT Security Career and Certification Seminar

IT Audit and IT Security Career and Certification Seminar IT Audit and IT Security Career and Certification Seminar Belina Yip, UST Alumnus Yvonne Fung,, UST Alumnus Raymond Chan, ISACA, HK Chapter 4 May 2006 Agenda Brief Introduction of IT Audit & IT Security

More information

State of South Carolina InfoSec and Privacy Career Path Model

State of South Carolina InfoSec and Privacy Career Path Model State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available

More information

Candidate s Guide to the CISM Exam and Certification

Candidate s Guide to the CISM Exam and Certification 2013 Candidate s Guide to the CISM Exam and Certification CISM Exams 2013 Important Date Information Exam Date 8 June 2013 Early registration deadline: 13 February 2013 Final registration deadline: 12

More information

ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE

ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE create better trained employees. choose the best value in training. ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE PRODUCTIVE train your workforce on-site. save on employee downtime

More information

Assessing & Managing IT Risks: Using ISACA's CobiT & Risk IT Frameworks

Assessing & Managing IT Risks: Using ISACA's CobiT & Risk IT Frameworks Assessing & Managing IT Risks: Using ISACA's CobiT & Risk IT Frameworks 2ο InfoCom Security Conference Anestis Demopoulos, Vice President ISACA Athens Chapter, & Senior Manager, Advisory Services, Ernst

More information

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Importance of Effective Internal Controls and COSO COSO

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

ISACA Tools Help Develop Cybersecurity Expertise

ISACA Tools Help Develop Cybersecurity Expertise Volume 21, 8 October 2014 ISACA Tools Help Develop Cybersecurity Expertise Nominate Qualified Candidates for the ISACA Board of Directors Tips for Solving Data Classification Challenges Earn CPE at Professional

More information

"Integrating ITIL and COBIT 5 to Optimize IT Process and Service Delivery"

Integrating ITIL and COBIT 5 to Optimize IT Process and Service Delivery "Integrating ITIL and COBIT 5 to Optimize IT Process and Service Delivery" 6th itsmf South East Europe Conference Michalis Samiotakis, ISACA Athens Chapter Athens, Greece, April 19, 2013 2 Agenda Who we

More information

COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30

COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30 COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30 Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.net

More information

Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003

Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003 The Certified Information Security Manager (CISM) certification is a unique management-focused certification that has been earned by more than 16,000 professionals since its introduction in 2003. Unlike

More information

Application for CISM Certification

Application for CISM Certification Application for CISM Certification 4/2015 Requirements to Become a Certified Information Security Manager become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade

More information

ISACA. Trust in, and value from, information systems. www.isaca.org

ISACA. Trust in, and value from, information systems. www.isaca.org ISACA Trust in, and value from, information systems www.isaca.org 2011 CISM Review Course Introduction ISACA Facts Founded in 1969 as the EDP Auditors Association More than 86,000 members in over 160 countries

More information

Facing Information Security Challenges

Facing Information Security Challenges AKTINA Event Information Security & Cloud Challenges March 17, 2016 Facing Information Security Challenges ISACA Cyprus Chapter Paschalis Pissarides CRISC, CISM, CISA Immediate Past President (2010-2014)

More information

AUDIT LOGGING/LOG MANAGEMENT

AUDIT LOGGING/LOG MANAGEMENT 1 AUDIT LOGGING/LOG MANAGEMENT KATHLEEN A MULLIN, MBA, CIA, CISA, CISSP, ISA, CISM, CRISC, CGEIT DIRECTOR OF IT SECURITY/CISO HEALTHPLAN SERVICES (HPS) AHIA 31 st Annual Conference August 26-29, 2012 Philadelphia

More information

Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting

Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting June 6, 2012 www.vita.virginia.gov 1 1 ISOAG June 2012 Agenda I. Welcome & Opening Remarks Michael Watson, VITA II. ISSA Certifications

More information

Certified Information Security Manager 2011 Candidate s Guide to the CISM. Exam and Certification

Certified Information Security Manager 2011 Candidate s Guide to the CISM. Exam and Certification Certified Information Security Manager 2011 Candidate s Guide to the CISM Exam and Certification 2 CISM Exams 2011 Important Date Information Exam Date 11 June 2011 Early registration deadline: 9 February

More information

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING forebrook Forebrook offers a range of information security, governance, IT systems and infrastructure related

More information

Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework )

Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework ) 10 October 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Experience with the Framework for Improving Critical Infrastructure

More information

Sarbanes-Oxley and Business Continuity

Sarbanes-Oxley and Business Continuity Sarbanes-Oxley and Business Continuity Bob Janusaitis, CISA, CISM, CBCP ACP Houston Chapter January 13, 2004 About us established in 1996, provides comprehensive enterprise-wide, expert guidance on IT

More information

About the Presenter About the Cloud Security Alliance Guidance 1.0 Getting Involved Call to Action

About the Presenter About the Cloud Security Alliance Guidance 1.0 Getting Involved Call to Action Governance, Risk Management, Compliance, & Audit An Overview of Cloud Security Alliance s Security Guidance for Critical Areas of Focus in Cloud Computing July 23, 2009 Agenda About the Presenter About

More information

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg

More information

Information Systems Security Engineering Professional (ISSEP)

Information Systems Security Engineering Professional (ISSEP) Information Systems Security Engineering Professional (ISSEP) 1 Presentation Outline What is ISSE Why ISSEP Development of the ISSEP Concentration Content Certification Specifics 2 Systems Security Engineering

More information

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

Director, IT Security District Office Kern Community College District JOB DESCRIPTION Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,

More information

Introduction to COBIT 5

Introduction to COBIT 5 Introduction to COBIT 5 Presented by Jamie M Donoghue Senior Consultant Lucid IT, Singapore Jamie M Donoghue Senior Consultant (Lucid IT Singapore) CISA, CGEIT, ITIL V3 Expert, ITIL V2 Service Manager,

More information

State of West Virginia Office of Technology Policy: Information Security Audit Program Issued by the CTO

State of West Virginia Office of Technology Policy: Information Security Audit Program Issued by the CTO Policy: Information Security Audit Program Issued by the CTO Policy No: WVOT-PO1008 Issue Date: 08.01.09 Revised: Page 1 of 12 1.0 PURPOSE The West Virginia Office of Technology (WVOT) will maintain an

More information

LINUX / INFORMATION SECURITY

LINUX / INFORMATION SECURITY LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,

More information

IS Audit and Assurance Guideline 2202 Risk Assessment in Planning

IS Audit and Assurance Guideline 2202 Risk Assessment in Planning IS Audit and Assurance Guideline 2202 Risk Assessment in Planning The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards

More information

Information Security Management Systems

Information Security Management Systems Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector

More information

MANAGEMENT DEVELOPMENT COURSES

MANAGEMENT DEVELOPMENT COURSES (FULL VIEW) MANAGEMENT DEVELOPMENT COURSES MANAGEMENT DEVELOPMENT COURSES LEADERSHIP DEVELOPMENT Developing Leadership Competencies 4 4 days 230,000 1-4 13-16 26-29 6-9 Critical Thinking: Tools for Problem

More information

Governance and Management of Information Security

Governance and Management of Information Security Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information

More information

So Why on Earth Would You WANT To be a CISO?

So Why on Earth Would You WANT To be a CISO? So Why on Earth Would You WANT To be a CISO? SESSION ID: PROF-M05A Todd Fitzgerald CISSP, CISA, CISM, CRISC, CGEIT, PMP, ISO27000, CIPP, CIPP/US, ITILV3f Global Director of Information Security Grant Thornton

More information

How do the latest best practices on IT Governance, CoBit and Business Service Management impact your Business Continuity Methodology?

How do the latest best practices on IT Governance, CoBit and Business Service Management impact your Business Continuity Methodology? How do the latest best practices on IT Governance, CoBit and Business Service impact your Business Continuity Methodology? Lillibett Machado 06/14/2005 1 Enterprise & IT Governance 2 Enterprise Governance...

More information

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization?

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could not only maintain, but update and upgrade

More information

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

ISACA S CYBERSECURITY NEXUS (CSX) October 2015 ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration

More information

IS Audit and Assurance Guideline 2402 Follow-up Activities

IS Audit and Assurance Guideline 2402 Follow-up Activities IS Audit and Assurance Guideline 2402 Activities The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards that apply

More information

ISO 27001:2005 & ISO 9001:2008

ISO 27001:2005 & ISO 9001:2008 ISO 27001:2005 & ISO 9001:2008 September 2011 1 Main Topics SFA ISO Certificates ISO 27000 Series used in the organization ISO 27001:2005 - Benefits for the organization ISO 9001:2008 - Benefits for the

More information

COBIT 5 Implementation Certifi cate. Training Course & Exam

COBIT 5 Implementation Certifi cate. Training Course & Exam COBIT 5 Implementation Certifi cate Training Course & Exam Introduction The COBIT 5 Implementation Certifi cate is a Practitioner Level Training Course that focuses on how to apply COBIT 5 (The Framework

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Dr. Vilius Benetis, CISA, CRISC NRD CS, Mon. 10:30-11:45

Dr. Vilius Benetis, CISA, CRISC NRD CS, Mon. 10:30-11:45 Dr. Vilius Benetis, CISA, CRISC NRD CS, vb@nrd.no Mon. 10:30-11:45 Problem Cybersecurity controls are failing to protect organizations. Controls consist of skills, process, and technology. Audit of technology

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

A Global Knowledge Special Report. 15 Top-Paying Certifications for 2015

A Global Knowledge Special Report. 15 Top-Paying Certifications for 2015 A Global Knowledge Special Report 15 Top-Paying Certifications for 2015 1-800-COURSES www.globalknowledge.com 15 Top-Paying Certifications for 2015 John Hales, Global Knowledge VMware, SDN, and SoftLayer

More information

Office Hours: By Appointment COURSE DESCRIPTION AND LEARNING GOALS

Office Hours: By Appointment COURSE DESCRIPTION AND LEARNING GOALS NYU Stern School of Business Summer 2012 ACCT- GB.6215 - IT Auditing Professor: Joel Lanz Tel: 516-933-3662 Office Hours: By Appointment email: TBD Course Website: Blackboard COURSE DESCRIPTION AND LEARNING

More information

Certificate of Cloud Security Knowledge (CCSK) v3 FAQ

Certificate of Cloud Security Knowledge (CCSK) v3 FAQ Certificate of Cloud Security Knowledge (CCSK) 3 FAQ May 2014 CLOUD SECURITY ALLIANCE CCSK 3 FAQ What is the Certificate of Cloud Security Knowledge (CCSK)? The CCSK is a web-based examination of indiidual

More information

How to enhance Trust and Value by using COBIT:

How to enhance Trust and Value by using COBIT: How to enhance Trust and Value by using COBIT: Governance and Management Framework CA A.Rafeq, FCA, CISA, CGEIT, CIA, CCSA Managing Director, Wincer Infotech Limited Past President, ISACA, Bangalore Chapter

More information

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies

More information

Enabling Information PREVIEW VERSION

Enabling Information PREVIEW VERSION Enabling Information These following pages provide a preview of the information contained in COBIT 5: Enabling Information. The main benefit of this publication is that it provides COBIT 5 users with a

More information

MANY CERTIFICATES WHAT S THE WORTH?

MANY CERTIFICATES WHAT S THE WORTH? MANY CERTIFICATES WHAT S THE WORTH? CLUSIT Security Summit Milano 17 Marzo 2016 Stefano Niccolini AIEA ISACA Milan Chapter (President) Basato su un lavoro di Umberto Annino, ISACA Switzerland Chapter (Certification

More information

Chayuth Singtongthumrongkul

Chayuth Singtongthumrongkul IT is complicated. IT Governance doesn t have to be. Chayuth Singtongthumrongkul CISSP, CISA, ITIL Intermediate, PMP, IRCA ISMS (ISO/IEC 27001) Director of International Academic Alliance, ACIS Professional

More information

Implementing Enterprise Governance of IT Using COBIT 5. A Business Driven Approach

Implementing Enterprise Governance of IT Using COBIT 5. A Business Driven Approach Value Insights Unlocking IT Value Transforming IT Enabled Investments into Business Value Implementing Enterprise Governance of IT Using COBIT 5 A Business Driven Approach Value Insights Unlocking IT Value

More information

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning Val-EdTM Valiant Technologies Education & Training Services 2-day Workshop on Business Continuity & Disaster Recovery Planning All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies.

More information

IT Service Management ITIL, COBIT

IT Service Management ITIL, COBIT IT Service Management ITIL, COBIT Bülent Ekuklu Business Development Executive IBM Global Services Global Conditions are Changing 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% Agriculture Manufacturing Service

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

OneCoin Blockchain Audit Report

OneCoin Blockchain Audit Report OneCoin Blockchain Audit Report June 2015 Semper Fortis Ltd А Republic of Bulgaria, Sofia 1000, 54 William Gladstone Str., floor 3 Т +359 2 44 123 79 F +359 2 44 128 79 E office@semperfortis.bg W www.semperfortis.bg

More information

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008 Information Security and Privacy Lynn McNulty, CISSP Advisory Board November 2008 Global leaders in certifying and educating information security professionals with the CISSP and related concentrations,

More information

Auditors Need to Know June 13th, 2012. ISACA COBIT 5 for Assurance

Auditors Need to Know June 13th, 2012. ISACA COBIT 5 for Assurance COBIT 5 What s New, What Auditors Need to Know June 13th, 2012 Anthony Noble Viacom Inc. ISACA COBIT 5 for Assurance Task Force Chair Special thanks to Derek Oliver & ISACA for supplying material for this

More information

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted

More information

HealthCare Information Security and Privacy Practitioner (HCISPP) Briefing Paper. Piloted by the Cyber Security Programme

HealthCare Information Security and Privacy Practitioner (HCISPP) Briefing Paper. Piloted by the Cyber Security Programme HealthCare Information Security and Privacy Practitioner (HCISPP) Briefing Paper Piloted by the Cyber Security Programme Published August 2015 2 Copyright 2015, Health and Social Care Information Centre.

More information

IT and Cybersecurity. Workforce Development with CompTIA Certification

IT and Cybersecurity. Workforce Development with CompTIA Certification IT and Cybersecurity Workforce Development with CompTIA Certification CompTIA solutions meet the federal IT security workforce challenge Federal agencies and contractors face an urgent and unrelenting

More information

IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES

IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES 1 2 THIS ONE PROVES YOU'RE HERE. THIS ONE SHOWS YOU'VE ARRIVED. 3 FROM GRADUATION TO RETIREMENT, (ISC) 2 FAST TRACKS CAREERS IN INFORMATION SECURITY. Secure

More information

CLASSIFICATION SPECIFICATION FORM

CLASSIFICATION SPECIFICATION FORM www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information

More information

Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals

Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals The U.S. government stands at a critical juncture in its cybersecurity efforts. As a country we face increasingly

More information

Application for CISA Certification

Application for CISA Certification Application for CISA Certification 4/2015 Requirements to Become a Certified Information Systems Auditor become a Certified Information Systems Auditor (CISA), an applicant must: 1. Score a passing grade

More information

How the State of Florida Builds Information Security Expertise Despite Escalating Risk and Tight Budgets.

How the State of Florida Builds Information Security Expertise Despite Escalating Risk and Tight Budgets. September 2010 How the State of Florida Builds Information Security Expertise Despite Escalating Risk and Tight Budgets. CHALLENGE Training and education have always been a top priority for the State of

More information

White Paper. COBIT 5 & BiSL

White Paper. COBIT 5 & BiSL White Paper COBIT 5 & BiSL This paper compares the scope and perspective of COBIT 5 and BiSL and shows how these two frameworks can be used in conjunction to assure that business information management

More information

by: Gerald R. Gagne, CPA, CISA

by: Gerald R. Gagne, CPA, CISA Community Bank Auditors Group COBIT June 4, 2014 by: Gerald R. Gagne, CPA, CISA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. Today s Agenda COBIT 5

More information

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org Security Certifications A Short Survey Welcome Stan Reichardt stan2007@sluug.org Disclaimer This is just a cursory look at what is out there. I believe certifications are good training tools, but not necessarily

More information

Continuing Professional Education Policy

Continuing Professional Education Policy S E R V I N G I T G O V E R N A N C E P R O F E S S I O N A L S Continuing Professional Education Policy Revised: 2008 January Table of Contents Overview..................................2 Certification

More information

Integrating the Project Portfolio Management and Service Portfolio Management: The Governance of Enterprise IT Perspective

Integrating the Project Portfolio Management and Service Portfolio Management: The Governance of Enterprise IT Perspective Integrating the Project Portfolio and Portfolio : The Governance of Enterprise IT Perspective George Papoulias CGEIT. ITIL Expert, PRINCE2 Prac;;oner, CRISC, CISA Senior Project Manager CONTENTS TYPES

More information

Understanding COBIT 5. based on ISACA Materials www.isaca.org/cobit. Prepared by: Deb Mallette, CGEIT, CISA, CSSBB, IMG BSMS EPDM, Process Consultant

Understanding COBIT 5. based on ISACA Materials www.isaca.org/cobit. Prepared by: Deb Mallette, CGEIT, CISA, CSSBB, IMG BSMS EPDM, Process Consultant Prepared by: Deb Mallette, CGEIT, CISA, CSSBB, IMG BSMS EPDM, Process Consultant Understanding COBIT 5 based on ISACA Materials www.isaca.org/cobit ISACA Silicon Valley Chapter Spring 1 Why COBIT is important

More information

IT Professional Certifications. By Dana Chaput ACC 626

IT Professional Certifications. By Dana Chaput ACC 626 IT Professional Certifications By Dana Chaput ACC 626 IT Professional Certifications Information Technology (IT) has seen a tremendous increase in acceptance and use by businesses in recent years. Because

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

IS Audit and Assurance Guideline 2401 Reporting

IS Audit and Assurance Guideline 2401 Reporting IS Audit and Assurance Guideline 2401 Reporting The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards that apply

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

Certification. Is it Right for You? 2013 Micron Technology, Inc. February 12, 2014

Certification. Is it Right for You? 2013 Micron Technology, Inc. February 12, 2014 Certification Is it Right for You? 2013 Micron Technology, Inc. All rights reserved. Products are warranted only to meet Micron s production data sheet specifications. Information, products, and/or specifications

More information

Presented by. Denis Darveau CISM, CISA, CRISC, CISSP

Presented by. Denis Darveau CISM, CISA, CRISC, CISSP Presented by Denis Darveau CISM, CISA, CRISC, CISSP Las Vegas ISACA Chapter, February 19, 2013 2 COBIT Definition Control Objectives for Information and Related Technology (COBIT) is an IT governance framework

More information

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING IS AUDITING GUIDELINE G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply

More information

for Information Security

for Information Security for Information Security The following pages provide a preview of the information contained in COBIT 5 for Information Security. The publication provides guidance to help IT and Security professionals

More information

This article describes how these seven enablers have contributed towards better information security management at HDFC Bank.

This article describes how these seven enablers have contributed towards better information security management at HDFC Bank. Information Security Management at HDFC Bank: Contribution of Seven Enablers By Vishal Salvi, CISM, and Avinash W. Kadam, CISA, CISM, CGEIT, CRISC, CBCP, CISSP, CSSLP HDFC Bank was incorporated in August

More information

Certification for Information System Security Professional (CISSP)

Certification for Information System Security Professional (CISSP) Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by

More information

Cloud Computing Advantages

Cloud Computing Advantages Cloud Computing Advantages Why you should go for it. Cloud Computing Task Force Marc Vael, Chairman Who started all this? What's interesting [now] is that there is an emergent new model, and you all are

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

Information Security Governance:

Information Security Governance: Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens

More information

G11 EFFECT OF PERVASIVE IS CONTROLS

G11 EFFECT OF PERVASIVE IS CONTROLS IS AUDITING GUIDELINE G11 EFFECT OF PERVASIVE IS CONTROLS The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply specifically

More information

Athens, 2 December 2011 Hellenic American Union Conference Center

Athens, 2 December 2011 Hellenic American Union Conference Center Athens, 2 December 2011 Hellenic American Union Conference Center ISACA Athens Chapter and the Hellenic American Union are organizing the 1 st ISACA Athens Chapter Conference on December 2 nd, 2011. The

More information

ISACA Singapore Chapter

ISACA Singapore Chapter ISACA Singapore Chapter Annual Report 2014/2015 Contents Introduction... 2 Chapter Administration... 3 K. Wayne Snipes Award Special Mention... 4 Industry Outreach... 4 Industry Collaborations... 5 Monthly

More information