ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE



Similar documents
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA

Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework )

Please feel free to call on our organizations if we can be of assistance in any way on further deliberations, task forces or committees.

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP

State of South Carolina InfoSec and Privacy Career Path Model

Enabling Information PREVIEW VERSION

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Office Hours: By Appointment COURSE DESCRIPTION AND LEARNING GOALS

Big Data: Impact, Benefits, Risk and Governance

{Are you protected?} Overview of Cybersecurity Services

ISACA Singapore Chapter

UNIVERSITY OF NEW BRUNSWICK. management programs TAKE CONTROL OF YOUR CAREER.

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW

IS Audit and Assurance Guideline 2402 Follow-up Activities

"Integrating ITIL and COBIT 5 to Optimize IT Process and Service Delivery"

Increasing IT Value and Reducing Risk. More for Less with COBIT5. IT Governance and Strategy

Terms of Reference for an IT Audit of

ISACA Tools Help Develop Cybersecurity Expertise

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

A Contrarian Risk Management Perspective. Nicole Keaton SVP Identity & Access Management CGEIT CISA CISM

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Continuing Professional Education Policy

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

Our Services. Unlocking IT Value - Transforming IT Enabled Investments into Business Value

COBIT 5 Implementation Certifi cate. Training Course & Exam

KEY TRENDS AND DRIVERS OF SECURITY

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization?

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

The enemies ashore Vulnerabilities & hackers: A relationship that works

Trends in Information Technology (IT) Auditing

Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards

Cloud Computing Advantages

IS Audit and Assurance Guideline 2202 Risk Assessment in Planning

Understanding the Federal IT Security Professional (FITSP) Certification

IT Governance Implementation Workshop

MANY CERTIFICATES WHAT S THE WORTH?

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Certification and Training

CYBERSECURITY NEXUS CSX. 15 October 2014 ISACA Winchester Chapter

Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003

Security Transcends Technology

9/13/ /20 Vision for Vendor Management & Oversight. Disclaimer. Bank Service Company Act - FIL-49-99

Grow the business of you

ow to use CobiT to assess the security & reliability of Digital Preservation

ISACA is responding to the PCAOB questions principally from an information technology (IT) perspective.

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors

Assessing & Managing IT Risks: Using ISACA's CobiT & Risk IT Frameworks

ISACA. Trust in, and value from, information systems.

Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA

Application for CISA Certification

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

REALIZING MAXIMUM BENEFITS FROM GOVERNANCE, RISKS AND COMPLIANCE (GRC) TOOLS

Risks and Rewards of the Internet of Things. Findings From ISACA s 2013 IT Risk/Reward Barometer

AUDIT LOGGING/LOG MANAGEMENT

Revised October 2013

IT Senior Audit Leader

Boost Your Supply Chain Performance and Productivity. APICS Certified Supply Chain Professional CSCP LOOK INSIDE CONTENT UPDATED FOR 2012!

Cloud Computing Thunder and Lightning on Your Horizon?

Grow the business of you

Application for CISM Certification

EMA Services for IT Professionals

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

G11 EFFECT OF PERVASIVE IS CONTROLS

ARE YOU READY FOR TOMORROW S IT? Discover ITpreneurs full curriculum of Virtualization and Cloud Computing competence development programs

CSCP. Boost Your Supply Chain Performance and Productivity. APICS Certified Supply Chain Professional

Internal Auditing Guidelines

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

UNIVERSITY OF NEW BRUNSWICK. project management programs ADVANCE YOUR CAREER WITH INDUSTRY-LEADING TRAINING.

Auditors Need to Know June 13th, ISACA COBIT 5 for Assurance

SECURING PAYMENTS IN THE CYBER WORLD

ITAF. 3 rd Edition. A Professional Practices Framework for IS Audit/Assurance

Executive Management of Information Security

Cyber Learning Solutions

Aalborg Universitet. Cloud Governance Berthing, Hans Henrik Aabenhus. Publication date: Document Version Preprint (usually an early version)

So Why on Earth Would You WANT To be a CISO?

Prosci Research Methodology Training Advisory Services

DoD Directive (DoDD) 8570 & GIAC Certification

Network Security: A Case Study

IT Audit in the Cloud

HOW TO BECOME AN HR PROFESSIONAL

PRINCE2 Project Management Certification

Social Networking and its Implications on your Data Security

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

An Actionable. exposure. Do not miss an opportunity to attend Mr. Pabrai s presentation. You will not be disappointed.

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Updated: 2014 January. Continuing Professional Education (CPE) Policy

PRINCE2 Project Management Certification

WHY? Why does this learning matter? Why does it stand out to you? Why is it important - to you personally or in the bigger picture?

Transcription:

create better trained employees. choose the best value in training. ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE PRODUCTIVE

train your workforce on-site. save on employee downtime and travel. Add to the value of your employees and enhance your enterprise s edge in today s increasingly competitive market! ISACA On-Site Training brings expert instruction, real-world experience and customizable course content to your workforce at your workplace or a convenient location you choose. ISACA On-Site Training enables you to: > Develop the skills of your employees in focus disciplines that include Cybersecurity Fundamentals, Audit/Assurance, Risk, Security, Governance and COBIT > Customize course length and content to your enterprise s specific requirements > Build the skills of your team in one or more sessions for one fixed price with less employee downtime and less hotel and travel expense > Realize immediate ROI from training by providing employees with skills that can be applied right away to add value and reduce risk in your enterprise Learn more at www.isaca.org/onsite

YOU NEED A COMPREHENSIVE VIEW OF EVERY ISSUE. ISACA TRAINING HELPS YOU COVER ALL THE ANGLES. KATIE STETZ, CISA, CISM, CRISC ATO COMPLIANCE ANALYST, RISK MANAGEMENT & COMPLIANCE CHICAGO, ILLINOIS, USA ISACA MEMBER SINCE 2005 PROFICIENT

ON-SITE TRAINING COURSES Customizable On-Site Training courses enable your people to meet real-world challenges and add value to your enterprise. Taught by trusted industry experts, ISACA On-Site Training courses range from fundamental to deep dives into the focus areas. Course length and content can be customized for your specific needs to maximize the value to your enterprise. For course outlines, to learn more about customization and for more information, visit www.isaca.org/onsite. Better Protect Your Enterprise Now and Into the Future Train your employees in the essential concepts of cybersecurity with ISACA s new Cybersecurity course offerings. Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Systems and Information Technology. ISACA s Cybersecurity courses are designed for this purpose, as well as to provide insight into the importance of cybersecurity, and the integral role of cybersecurity professionals.

Courses by Focus Areas Audit/Assurance Courses Fundamentals of IS Audit and Assurance (FISAA) IT Audit and Assurance Practices (ITAAP) The Essentials of Cloud Computing for Audit Professionals Web Application Security for Auditors Security Topics Information Security Management Information Security Management (Advanced) Assessor for Security Cybersecurity Courses Implementing NIST Cybersecurity Framework Using Cybersecurity Fundamentals Risk Courses IT Risk Management Risk-Based Approach to IT Infrastructure Security & Control Assessments Security & Audit Courses Securing & Auditing Wireless & Mobile Technologies Securing & Auditing Mobile Technologies Windows 8 Security & Audit Audit & Security of Firewalls Virtualization Security & Audit Cloud Computing Security & Audit Database Security and Audit COBIT & Governance Courses Foundation Course Implementation Course Assessor Course COBIT: Strategies for Implementing IT Governance Governance of Enterprise IT Using in IT Assurance and Audit Certification Review Courses CISA Exam Review CISM Exam Review CGEIT Exam Review CRISC TM Exam Review

CERTIFIED ASSESSOR PROGRAM Unique Skills invaluable to your enterprise > Enhance your strategic assets. Open your enterprise to greater opportunity. With IT leaders within your enterprise who can plan and communicate change and improvement initiatives, you can more easily gain C-level and board member buy-in. > Set your enterprise up for future success. Certified Assessors are highly competent IT and business professionals trained and experienced in planning, building, and running IT processes and providing reliable, consistent and repeatable enterprisewide assessments of IT process capabilities. The Certified Assessor Pathway Your IT/IS Business Managers, Auditors, Information Security and IT Practitioners or Governance professionals can become Certified Assessors by successfully completing the pathway: Foundation Exam Assessor Course Assessor for Security Course Assessor Exam Assessor Certification The Assessor Exam can be taken after completion of either the Assessor course or the Assessor for Security course. With a passing score, prerequisites met and required work experience, your employee can apply to become a COBIT Certified Assessor. Learn more at www.isaca.org/cobitassessor

ISACA TRAINING FOCUSES ON REAL-WORLD ISSUES. MANY SOLUTIONS CAN BE APPLIED DIRECTLY IN YOUR ENTERPRISE. KETAN DHOLAKIA, CISM, CRISC MANAGING PARTNER, MACLEAR CHICAGO, ILLINOIS, USA ISACA MEMBER SINCE 2007 LEARN MORE

OUR COMMITMENT TO YOU Our methodology begins by working with you directly to understand your business needs and provide the best solution for you. To this we add dedicated account management, world-class fulfillment, and access to deep expertise from our instructors and subject matter experts. ISACA On-Site Training optimize the value of your people and training > Save on employee downtime and travel expenses > Train in a location convenient for you for one flat fee > Customize training to your specific requirements > Empower employees with training and real-world experiences of expert instructors VALUABLE Learn more at www.isaca.org/onsite ISACA is a global association that builds trust in, and value from, information systems. Established over 45 years ago, ISACA is a trusted source of knowledge, networking, education and career development for audit, assurance, risk, security, cybersecurity, control, privacy and governance professionals. Through our worldwide community, ISACA inspires and equips individuals to be more capable, valued and successful in the fast-changing world of information systems, information technology and business. 2015 ISACA. All rights reserved. 3701 Algonquin Road, Suite 1010, Rolling Meadows, Illinois 60008, USA