HISP Certification Course (5 days) - 35 CPEs ***HISP stands for Holistic Information Security Practitioner.
|
|
|
- Albert Barnett
- 10 years ago
- Views:
Transcription
1 HISP Certification Course (5 days) - 35 CPEs ***HISP stands for Holistic Information Security Practitioner. This is the only integration course available today, which teaches the integration of ISO 27002/27001 with COBIT, COSO, ITIL and Multiple Regulations, pertaining to Information Security & Privacy. The Holistic Information Security Practitioner (HISP) Certification course is an internationally recognized differentiator in the Information Security space and one of the fastest growing information security certifications for Information Security Practitioners, Managers and Officers. In the current global economic recession, a recent CareerBuilder.com report indicates that the Information Security Manager position falls within one of the top 5 industries that are considered to be recession proof. The objective of this course is to provide participants with the necessary skills to implement a corporate Information Security Management System (ISMS) framework that is compliant with the requirements of ISO 27002, UK Data Protection Act, EU Directive on Privacy, HIPAA Security, GLB Act, Sarbanes-Oxley Act (Security), FACT Act, PCI Data Security, NIST , PIPEDA, PIPA and California SB-1386 and meets the certification requirements of ISO This is the only integration class that provides practical education on the integration of best practices for Information Security Management, Information Systems Auditing and multiple Regulatory Compliance requirements and how to map multiple regulatory requirements to the internationally accepted best practices framework of ISO 27001/ Who should attend? Staff tasked with the implementation and management of an formal internationally accepted Information security management system (ISMS). Staff tasked with ensuring compliance with standards and requirements such as (but not limited to) UK Data Protection Act, EU Directive on Privacy, HIPAA Security, SOX Security, FFIEC, GLBA, California SB1386, FACT Act, PCI Data Security, NIST , OSFI, PIPEDA, PIPA, Canadian Bill C-168 and other regulations. Information Security Consultants or Third Party Auditors. Auditors (External and Internal). Information Security Officers. IT Managers/Directors. Privacy/Compliance Officers.
2 Course Curriculum: Day 1 3 Content: ISO 27001/27002 Compliance Description: 5 days / 35 CPEs / (On Demand web based class also available) Benefits to Your Business Learn how to adopt international best practices pertaining to Information Security. Take the knowledge and skills imparted during this exercise and use them to improve confidentiality, integrity and availability of information systems. Gain competitive advantage. Improve customer and investor confidence. Show due diligence and due care. Content This module is designed for people who have a reasonable awareness of Information security management. History of the ISO series. Evolution of the ISO Series ISO certification requirements. Determination of scope. Identification of information assets. Determination of the value of information assets. Determination of risk. Determination of policy(ies) and the degree of assurance required from controls. Identification of control objective and controls. Definition of polices, standards and procedures to implement the controls. Production and implementation of policies, standards and procedures. Completion of ISMS documentation requirements. Establishment of Management Framework and Security Forum. Audit and review of ISMS. Case Studies. Course Curriculum: Day 3-4 Module: COBIT auditing framework. Description: The objective of this module is to provide delegates with the necessary skills to audit information technology systems using COBIT as a benchmarking standard.
3 Benefits to Your Business Learn how to adopt COBIT as an IT governance framework. Take the knowledge and skills imparted during this exercise and use them to improve confidentiality, integrity and availability of information systems. Gain competitive advantage. Improve customer and investor confidence. Show due diligence and due care. Content History of COBIT. Understanding COBIT Controls. Understanding COBIT mapping to ISO Understanding COBIT mapping to COSO. Understanding COBIT mapping to ISO and ITIL. COBIT case studies. Course Curriculum: Day 5 Module: Mapping Methodology Description: The objective of this module is to provide delegates with the knowledge of how ISO (Annex A of ISO 27001) requirements map to HIPAA, FFIEC, GLB Act, Sarbanes-Oxley Act, OSFI, PIPEDA, PIPA, Canadian Bill C-168 and other various regulations. Benefits to Your Business Learn how to effectively map multiple standards through a Compliance Matrix. Take the knowledge and skills imparted during this exercise and use them to improve confidentiality, integrity and availability of information systems. Gain competitive advantage. Improve customer and investor confidence. Show due diligence and due care Learn how to use your management system to track a measurable return on investment Content Regulatory Compliance Mapping: Regulatory Haystack
4 Case Study/Group Exercise Certification Exam Attendees can chose to take the HISP Certification Exam the afternoon of Day 5, consisting of: 100 multiple-choice questions. Questions covering the entire HISP course curriculum.
5 Instructor Biographies Taiye Lambo CISSP, CISM, CISA, HISP, ISO Auditor Taiye Lambo is a Security subject matter expert in the area of Information Security Governance; with years of experience in design & implementation of Intrusion detection and prevention systems, Honeypots, Computer Forensics, Ethical Attack & Penetration Testing, Biometric Identification, Network Security Architecture, Information security governance. He founded the UK Honeynet project and the Holistic Information Security Practitioner (HISP) Institute He has successfully executed information security projects for a number of United Kingdom government agencies and also provided information security consulting to State of Georgia agencies. In the commercial sector he has completed Consulting engagements for clients, in the Manufacturing, Financial Services and Healthcare sector. He was the Director of Information Security for John H. Harland (now Harland Clarke), the leading provider of solutions to the Financial Services industry, including check and check related products and accessories, direct marketing solutions, and contact center solutions. He has dual expertise as a hybrid technical and business information security consultant with a pragmatic holistic approach to the management of information security and regulatory compliance, as well as a subject matter expert on Information Security governance and compliance relating to regulatory standards such as HIPAA, Sarbanes-Oxley Act, Gramm-Leach Bliley Act (GLBA), FDIC and others. His presentations at security events include conferences organized by organized by ISSA, InfraGard, ISACA, CPM, SOFE, EDUCAUSE, Kuwait Information Security Conference and HITRUST. Taiye is President and Founder of efortresses, an Atlanta based Cyber security, risk and compliance management solutions company founded in In the United Kingdom, he founded a successful information security firm CyberCops Europe, gained assignments in the USA for commercial and government agencies where he continued Information security and compliance consulting and became a subject matter expert in several of the current regulations. His involvement in the USA grew with speaking engagements at leading seminars & conferences. He left CyberCops Europe, came to the USA and founded efortresses in October He has established numerous valuable contacts nationwide and has name recognition in the information security/regulatory compliance space. efortresses developed the industry s first integrated security and compliance assessment product, Compliantz - an automated process to assess an organization's processes, policies, procedures and standards against internationally accepted information security best practices and multiple regulatory requirements, including HIPAA Security, Sarbanes-Oxley Act (Security), GLB Act, California SB-1386, NIST , FACT Act and PCI Data Security. efortresses also developed and holds classes nationwide in the industry's very first information security, audit and compliance certification course - Holistic Information Security Practitioner (HISP). With a Bachelors degree in Electrical Engineering, he also earned a Masters degree in Business Information Systems from the University of East London (United Kingdom).
6 Charles Edward Wilson CISM, ISSM, HISP, MTS Ed Wilson is CISM, DoD Certified Information Systems Security Manager (ISSM), and a retired US Navy Cryptologic Technical Technician with over 27 years experience in INFOSEC - securing, auditing, and accrediting IT systems to include protection of sensitive corporate information in compliance with DoD regulations, ISO 9000, BS7799/ISO 17799, ISO 15408, FISMA, COSO, COBIT, GLBA, SOX, and HIPAA legislation. Ed Wilson is a Certified Master Training Specialist, Testing Officer/Testing Supervisor, Curriculum Developer, and Technical Writer that strengthens his demonstrated excellence in leadership, technical competence, application of instructional methodology, and desire to improve educational awareness through quality instruction. As an INFOSEC Subject Matter Expert, Ed Wilson developed 3 Information Systems Security Manager (ISSM) courses, consisting of 31 INFOSEC topics at the master level. Ed was an adjunct lecturer on INFOSEC manners for the National Security Agency (NSA) having taught twenty-six (26) National Cryptologic School courses for NSA. John A. DiMaria Certified Six Sigma Black Belt; HISP; Master HISP, CBCI John DiMaria (Co-Author of How to Deploy BS ) is a management system professional and certified Holistic Information Security Practitioner (HISP) with 25 years of successful experience in Management System Development, including Information Systems, Quality Assurance, International Quality Standards, Statistical Process Control, Regulatory Affairs, Customer Service, Subcontractor Analysis and Marketing/Sales in a highly competitive National and international environment. As the former Product Manager for BSI Management Systems America, John was the technical, audit, scheme and marketing specialist responsible for overseeing development, education and expertise for BSI Americas regarding all information security and business continuity activities including ISO 27001, World Lottery Association (WLA), ISO and BS John was also the recipient of the BSI Global Innovation Award. He serves on committees that influence legislation and drive international harmonization such as the ANAB PS- Prep (Title IX) committee of experts and the BITS Shared Assessment Program. He is the President of the HISPI (Holistic Information Security Practitioner Institute) and has been featured in many publications concerning various topics regarding information security and business continuity. such as Computer World, Quality Magazine, QSU, SC Magazine, Campus Technology, Continuity Insights, ABA Banking Journal, CPM Magazine, GSN Magazine (dubbed Business Continuity s new standard bearer ) and the featured interview on the cover and of PENTEST Magazine. Prior to joining BSI, DiMaria was the Managing Consultant responsible for Information Security Services for LECG a global expert services firm. He has experience working with both national and international environments.
7 John holds formal BSI qualifications in several areas of ISMS, ITSM and BCMS: I001 BSI Learning Instructor, I003 Instructor Trainer, I0LA BSI Lead Auditor Instructor (ISO 27001, BS Business Continuity Instructor), IHIS Holistic IS Practitioner, BSI ITSM ISO Technical Audit and standards Specialist (TS), BSI ISMS ISO Technical audit and Standards Specialist, BS Assessor. HIGHLIGHTED EXPERIENCE Served as the BSI Americas Technical & Marketing specialist in the areas of ISO 27001, ISO 20000, BS and all other areas of Information Security and Business Continuity. Designed and delivered training to Field Development Staff on ISO/BS 7799/27001 processes and mapping an ISMS to best practice regulatory and IT Standards. Designed and delivered projects for building, training and servicing in all areas of TQM, Regulatory Affairs, Information systems, Risk Analysis, the International Management System Standards, Statistical Process Control, Customer Service and Marketing and Sales, showing a cost savings through process improvement These projects included but were not limited to: Complete ISMS and other Management System Implementation Management System Analysis and Improvement Process Mapping Process Flow Analysis Process Control Planning Fault Tree Analysis Technical Writing Preventive Action Planning and Implementation Use Case Modeling EXPERIENCE CONT. Six Sigma Statistical Analysis Failure Mode Effect Analysis Regulatory Analysis and Compliance (Including EMS & OSHA processes) Employee Engineering Training Development & Delivery Auditing (Internal and External) Subcontractor Evaluation Risk Assessment & Management Business Process Re-engineering Served 4 years as member of the Top Management Operations Board of Directors for a multi-site $100M corporation. Prior 16 years managed implementation of SPC, Regulatory Affairs, process controls, information systems and international management systems standards. Performed over 100 internal quality system and external supplier quality audits.
8 Served on an Automotive Advisory Committee to represent the Chemical Industry during the original conception of the QS 9000 international automotive standard. Implemented Six Sigma strategies and led a cross-functional team for a major multi-million dollar corporation in St. Louis, MO. EDUCATION HISP (Holistic Information Security Practitioner); Certification B.B.(Black Belt) Six Sigma Certification, GE Six Sigma Academy Certificate, Six Sigma Leadership Certificate, Quality Operating Systems(QOS) FMEA; Eastern Michigan University Certificate. Electronic Data Interchange; EDI, INC Certification; Internal Auditor, Quality Management Institute DMACS Computerized Process Controls A.S. Computer Information Systems, Columbia College PUBLICATIONS How to Deploy BS Version 2, April 2008 How to Deploy BS 25999; September 1, 2007 BS 7799 Audit Preparation; BSI Management Systems, March 2005 Benefits of BS 7799 and ISO 17799; BSI Management Systems, April 2005 BS 7799 Drivers and Advantages; BSI Management Systems, March 2005 PROFESSIONAL AFFILIATIONS HISP (Holistic Information Security Practitioner Institution); President Business Continuity Institute (BCI) Member Business Continuity Institute (BCI) Training Affiliate BITS Financial Institution Shared Assessment Program Working Group Member DHS PS-Prep Program Committee of Experts EC Union iaffiliate Rainmakers Marketing Group Founding Member American Society for Quality (Secretary; Board of Directors; ) CHARITABLE AFFILIATIONS St. Patrick Center for the homeless and addicted St. Louis, MO New Life Evangelistic Center (NLEC) for the homeless St. Louis, MO Catholic Charities Association (Board of Directors) St. Louis, MO Over 44 Speaking Engagements both national and international 6 Keynotes.
9 Gary Sheehan; CISSP, HISP Professional Summary Gary Sheehan possesses over 20 years of information security experience. Gary has held a variety of information technology positions since Gary has strong leadership, communication and people management skills. As Director of GRC Services, Gary is responsible for managing the design, delivery and implementation of governance, risk, security and compliance solutions that meet customer needs and keep pace with the constantly evolving regulatory and security requirements. Gary has assisted a number of companies with large-scale security management initiatives to facilitate the voluntary and mandatory compliance requirements of their organizational directives. Achievements & Accomplishments Speaker at industry events such as Information Security Summit, CSI Conference and MIS Institute InfoSec World. Developed and implemented security policy, security awareness programs, vulnerability management solutions, risk management solutions, security process improvements, security organization studies, and wireless security solutions for multiple organizations. Provided Security Advisory services to a number of Northeast Ohio organizations Certificate of Appreciation from the Cleveland FBI office for exceptional service in the public interest. Letter of commendation from the Cleveland FBI office for exemplary service to the local chapter Winner of the Linda Franklin Award. Founded the Information Security Summit Education & Certifications Graduated cum laude from Baldwin-Wallace College in 1989 with a Bachelor of Arts Degree in Business Administration. Continued education including classes, seminars and self-study in multiple security areas. Obtained CISSP certification in 2002 Completed the FBI Citizen s Academy in Cleveland, Ohio in Obtained HISP certification in 2007 Professional Affiliations Northern Ohio Members Alliance of InfraGard President. Information Security Summit - Executive Director. Northeast Ohio Think Tank Advisory Board HISP Institute Board of Directors Skill Summary OS system Security Mainframe Security (Top Secret, ACF2, RACF) Windows NT Security ISS Security Product Suite QualysGuard Enterprise Security Organization Implementation Security Strategy & Design
10 ISO ISO Security Policy Security Process Improvement Project Management Vulnerability Management Risk Management Security Awareness & Training M&A Security Program Implementation ISO Frameworks Ralph Johnson; CISSP, CISM, HISP, CIPP/G Ralph Johnson is the Chief Information Security and Privacy Officer for King County, Washington and Secretary to the Governance Board of the Holistic Information Security Practitioners Institute (HISPI). Mr. Johnson s has filled numerous positions within King County over the past 22 years. King County is Located on Puget Sound in Washington State, and covering 2,134 square miles, King County is nearly twice as large as the average county in the United States. With more than 1.9 million citizens, it ranks as the 14th most populous county in the nation, with approximately 15,000 employees, 14 departments and multiple lines of business. For the past 7 years Mr. Johnson has held the position of Chief Information Security and Privacy Officer in which he oversees information security and privacy issues for the entire county infrastructure. In this capacity he established the information assurance program from policy development to controls selection, implementation, monitoring and evaluation. Mr. Johnson has served as Security Architect for King County, Network Services Manager, PC Support Supervisor, and Network Engineer for the county s department of Public Health. He has held the position of Secretary of the HISPI Governance Board for the past three years. Mr. Johnson has a Bachelor s degree in Business Administration from Eastern Oregon University and an Associate s degree in Mortuary Science form San Francisco College of Mortuary Science. He holds multiple certifications in information security, information privacy, network administration and project management.
Achieving Governance, Risk and Compliance Requirements with HISP Certification Course
Achieving Governance, Risk and Compliance Requirements with HISP Certification Course in corporation with A unique information security and regulatory compliance certification course that provides IT security
Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza
Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS
Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS Jefferson Wells has prepared this report for Corporate Creations.
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Importance of Effective Internal Controls and COSO COSO
Executive Cyber Security Training. One Day Training Course
Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand
Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Harmonizing Your Compliance and Security Objectives. Bonnie A. Goins Adjunct Professor, Illinois Institute of Technology
Harmonizing Your Compliance and Security Objectives Bonnie A. Goins Adjunct Professor, Illinois Institute of Technology Make sure efforts serve multiple purposes Use standards to guide effort Repeatable
Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, 2004 9:00 AM
Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance RSA Security and Accenture February 26, 2004 9:00 AM Agenda Laura Robinson, Industry Analyst, RSA Security Definition of
ERIC M. WRIGHT, cpa, citp
ERIC M. WRIGHT, cpa, citp ERIC M. WRIGHT, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He specializes in and oversees the design, setup, installation and
-Blue Print- The Quality Approach towards IT Service Management
-Blue Print- The Quality Approach towards IT Service Management The Qualification and Certification Program in IT Service Management according to ISO/IEC 20000 TÜV SÜD Akademie GmbH Certification Body
CASPR Commonly Accepted Security Practices and Recommendations
hhhhhhhhhhhhhh CASPR Commonly Accepted Security Practices and Recommendations CASPR is an open-source project aimed at documenting the information security common body of knowledge through commonly accepted
National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work
National Cyber Security Awareness Month Week Two: Creating a Culture of Cybersecurity at Work Webinar Recording and Evaluation Survey This webinar is being recorded and will be made available online to
KEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
State of South Carolina InfoSec and Privacy Career Path Model
State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available
kamai Technologies Inc. Commonly Accepted Security Practices and Recommendations (CASPR)
kamai Technologies Inc. Commonly Accepted Security Practices and Recommendations (CASPR) June 2015 Table of Contents CASPR... 2 FIPS 140-2: Security Requirements For Cryptographic Modules... 2 Federal
KLC Consulting, Inc. All Rights Reserved. 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT
1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT About Kyle Lai 2 Kyle Lai, CIPP/G/US, CISSP, CISA, CSSLP, BSI Cert. ISO 27001 LA President of KLC Consulting, Inc. Over 20 years in IT and Security Security
ITIL v3 Service Manager Bridge
ITIL v3 Service Manager Bridge Course Length: 5 Days Course Overview This 5 day hands on, certification training program enables ITIL Version 2 certified Service Managers to upgrade their Service Manager
THOMAS WELCH, CISSP, CPP, CISA, CISM, CFI, CHS-III [email protected] SUMMARY
, CISSP, CPP, CISA, CISM, CFI, CHS-III [email protected] SUMMARY Mr. Welch has over twenty years in the Security and Information Systems business, twelve of which he was directly responsible for
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Security Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]
{Are you protected?} Overview of Cybersecurity Services
{Are you protected?} Overview of Cybersecurity Services Why Plante Moran is built on thousands of success stories. CLIENT FOCUS The confidence that the client s needs are put ahead of the firm s by a professional
IT Security & Compliance Risk Assessment Capabilities
ATIBA Governance, Risk and Compliance ATIBA provides information security and risk management consulting services for the Banking, Financial Services, Insurance, Healthcare, Manufacturing, Government,
Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA
Volume 3, July 2014 Come join the discussion! Alberto León Lozano will respond to questions in the discussion area of the COBIT 5 Use It Effectively topic beginning 21 July 2014. Mapping COBIT 5 with IT
A Flexible and Comprehensive Approach to a Cloud Compliance Program
A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility
TOPSECRETPROTECTION.COM (TSP)
TOPSECRETPROTECTION.COM (TSP) OVERVIEW OF CYBER SECURITY-INFORMATION SYSTEMS SECURITY PROGRAM MANAGEMENT TRAINING COURSE CYBER SECURITY-ISSPM PROFESSIONAL CERTIFICATION Introduction To TSP TSP has over
BENJAMIN TOMHAVE, MS, CISSP
Herndon, VA [email protected] +1 703-282-8600 SENIOR SECURITY PROFESSIONAL An Information Security Leader with demonstrated success driving proactive security initiatives in a variety of organizations
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant
THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda
Security Testing. Claire L. Lohr, CSQE, CSDP, CTAL [email protected]. F. Scot Anderson, CISSP [email protected]. April 7, 2009 V 1.
Standards Based Security Testing Claire L. Lohr, CSQE, CSDP, CTAL [email protected] F. Scot Anderson, CISSP [email protected] 1 Topics Why use standards? Secure systems component parts (1st level taxonomy)
Achieving Business Imperatives through IT Governance and Risk
IBM Global Technology Services Achieving Business Imperatives through IT Governance and Risk Peter Stremus Internet Security Systems, an IBM Company Introduction : Compliance Value Over the past 15 years
IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014
IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies
Terms of Reference for an IT Audit of
National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor
CYBERSECURITY: ISSUES AND ISACA S RESPONSE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance
Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA
Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Mr. Rojas has over 25 years of information systems consulting, supervisory, managerial and executive experience in various industries. He is considered
Designing & Building an Information Security Program. To protect our critical assets
Designing & Building an Information Security Program To protect our critical assets Larry Wilson Version 1.0 March, 2014 Instructor Biography Larry Wilson is responsible for developing, implementing and
JAMES R. SWAUGER Digital Forensic Examiner
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 726 East Main Street, Suite F #150 Lebanon, Ohio 45036 Phone: 866.246.2794 x703 Email: [email protected] CERTIFICATIONS
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services...
Contents Company Biography...4 Qualifications & Accolades...5 Executive Leadership Team...6 Products & Services...8 Company History...10 Facts Founded: 2000 CEO: Brad Caldwell Website: www.securitymetrics.com
AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives
AUD105-2nd Edition Auditor s Guide to IT - 20 hours Objectives More and more, auditors are being called upon to assess the risks and evaluate the controls over computer information systems in all types
All about CPEs. David Gittens CISA CISM CISSP CRISC HISP
All about CPEs David Gittens CISA CISM CISSP CRISC HISP The Designer David Gittens ISSA Barbados Past President Certified in ethical hacking and computer forensics Certified in security management and
IT Governance: The benefits of an Information Security Management System
IT Governance: The benefits of an Information Security Management System Katerina Cai, CISSP Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
How To Improve Your Business
IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends
Certification and Training
Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel
Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.
Table of Contents PART I. IS Audit Process. CHAPTER 1. Technology and Audit. Technology and Audit. Batch and On-Line Systems. CHAPTER 2. IS Audit Function Knowledge. Information Systems Auditing. What
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Curriculum Vitae. Personal information. VASILEIADIS Nikolaos. Work experience. Surname / First name
Curriculum Vitae Personal information Surname / First name Addresses VASILEIADIS Nikolaos Home: Koumoundourou 32, 15341,, Greece Work: Yakinthou 3C, 15343,, Greece Telephones Home: +30 210 6084531 Work:
Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
ITIL 2011 Service Design Certification Program - 3 Days
ITIL 2011 Service Design Certification Program - 3 Days Program Overview ITIL is a set of best practices guidance that has become a worldwide-adopted framework for Information Technology Services Management
Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe
Introduction to QualysGuard IT Compliance SaaS Services Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe A Unified and Continuous View of ICT Security, Risks and
Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority
Cloud Security Standards Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority Introduction Sign Off December 2012 Information Technology Authority
Paul Vlissidis Group Technical Director NCC Group plc [email protected]
Managing IT Fraud Using Ethical Hacking Paul Vlissidis Group Technical Director NCC Group plc [email protected] Agenda Introductions Context for Ethical Hacking Effective use of ethical hacking in fraud
Governance Simplified
Information Security Governance Simplified From the Boardroom to the Keyboard TODD FITZGERALD, cissp; cisa, cism Foreword by Tom Peltier CRC Press Taylor & Francis Croup Boca Raton London NewYork CRC Press
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
13 th Annual General Meeting
13 th Annual General Meeting Meet the Candidates You can hear from the candidates in the 2016 Board of Director Election by attending the Meet the Candidates webinar on Tuesday, May 3, 2016 from 3:00 pm
COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization
Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Outside View of Increased Regulatory Requirements Regulatory compliance is often seen as sand in the gears requirements
Committees Date: Subject: Public Report of: For Information Summary
Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security
Preparation Guide. Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000
Preparation Guide Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000 Edition June 2015 Copyright 2015 EXIN All rights reserved. No part of this publication may be published,
White Paper. IT Security in Higher Education
White Paper IT Security in Higher Education 3BIntroduction: The Growing Need for Improved IT Security on Campuses IT security is a hot topic these days, especially at colleges and universities. An April
Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
What can HITRUST do for me?
What can HITRUST do for me? Dr. Bryan Cline CISO & VP, CSF Development & Implementation [email protected] Jason Taule Chief Security & Privacy Officer [email protected] Introduction
IT Governance Implementation Workshop
IT Governance Implementation Workshop 3 Full day power packed workshop facilitated by Mr. Gary Allan Banister and Mr. Sreechith Radhakrishnan About the Programme Information is created, used, retained,
EDUCORE ISO 20000 Expert Training
EDUCORE ISO 20000 Expert Training Overview ISO/IEC 20000 is the first international standard for IT service management. It was developed in 2005, by ISO/IEC JTC1 SC7 and revised in 2011. ISO/IEC 20000-1:2005
Defending the Database Techniques and best practices
ISACA Houston: Grounding Security & Compliance Where The Data Lives Mark R. Trinidad Product Manager [email protected] March 19, 2009 Agenda Understanding the Risk Changing threat landscape The target
Bio Summary and CV. curriculum vitae of John C. Villines; Introduction; page 1 of 5 (rev Jan 2013)
Bio Summary and CV John Villines has dedicated his adult life to security, investigations and crime prevention. He has maintained a company license (Security and Investigations) in Georgia for approximately
Certification for Information System Security Professional (CISSP)
Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by
WENDY L. FRASER, PhD 9628 Regency Loop SE Olympia, Washington 98513 360-556-6056 [email protected] Curriculum Vita
WENDY L. FRASER, PhD 9628 Regency Loop SE Olympia, Washington 98513 360-556-6056 [email protected] Curriculum Vita PROFESSIONAL STRENGTH Growing people and organizations; enhancing interpersonal
Cloud Computing An Auditor s Perspective
Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP [email protected] December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,
TRAINING TITLE: Internal Auditing Workshop (WORK-008)
TRAINING TITLE: Internal Auditing Workshop (WORK-008) OVERVIEW: GMP regulations worldwide as well as FDA and ICH guidances require that companies have in place an internal quality audit program. Auditing
12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013
Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He
Understanding the Federal IT Security Professional (FITSP) Certification
Understanding the Federal IT Security Professional (FITSP) Certification Jim Wiggins Executive Director Federal IT Security Institute ISACA NCAC Conference Certification and Emerging Standards Holiday
CFPB Readiness Series: Compliant Vendor Management Overview
CFPB Readiness Series: Compliant Vendor Management Overview Legal Disclaimer This information is not intended to be legal advice and may not be used as legal advice. Legal advice must be tailored to the
Database Security and Auditing
Database Security and Auditing COURSE DESCRIPTION: This seminar aims to provide the Database Administrators, System Administrators, Auditors and IT Security Officers an overview on how to secure and audit
JUANITA HARRIS-PRICE 4221 20 th Street NE Washington, District of Columbia [email protected] (202) 246-1942
JUANITA HARRIS-PRICE 4221 20 th Street NE Washington, District of Columbia [email protected] (202) 246-1942 EXECUTIVE MANAGEMENT Behavioral Health Care Children and Family Services State and Local
CLASSIFICATION SPECIFICATION FORM
www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information
