Information session April 2nd, 2015. Master 2 in Information System Security Management (ISSM)



Similar documents
Master in Accounting and Audit. Master académique

Politique de sécurité de l information Information Security Policy

Master in Mathematics

Question: 1 Which of the following should be the FIRST step in developing an information security plan?

Academic Calendar

Information security risk management using ISO/IEC 27005:2008

Security Transcends Technology

APPLICATION PROCEDURE FOR INCOMING STUDENTS

Information Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer

Cyber Security - What Would a Breach Really Mean for your Business?

Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG

The problem of cloud data governance

The Next Generation of Security Leaders

Guide to listing of debt on European stock exchanges

EU Financial Services Law: How Financial Institutions Meet Internal Governance and Risk Management Requirements?

Revised October 2013

Fund Services Intelligence

Under the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems

Information Security Management Systems

Executive Cyber Security Training. One Day Training Course

Cyber Security key emerging risk Q3 2015

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course

3 STAGE PUBLIC PROGRAMS PROFESSIONAL NEGOTIATION & INFLUENCING PROGRAM. g Negotiate with confidence g Do deals that deliver g Get what YOU want

Records and Document Management

Table of Contents. 1. Organisation and Management (5 ECTS) 1.1. Management

Master in Public Management and Policy (PMP) Specialisation in Public Management and Economics Specialisation in Public Communication

Governance and Management of Information Security

North Texas ISSA CISO Roundtable

Specialist Cloud Services. Acumin Cloud Security Resourcing

Information Security Program CHARTER

CASS Europe MBA Healthcare Management Specialization. Program Structure. Individual Module description. Type of course unit (compulsory, optional):

Managing e-health data: Security management. Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST

Cyber Security Recommendations October 29, 2002

USF Graduate Catalog SECTION 23.

Cybersecurity and the AICPA Cybersecurity Attestation Project

The Johns Hopkins University School of Medicine Calendar (all dates are inclusive)

TIPA : services based on standards

TRAINING BROCHURE 2015

Privacy and Security Risk Management Framework

Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice

ISE Northeast Executive Forum and Awards

M NCPA FACTS ABOUT THE CPA EXAM AND CERTIFICATION

LEGAL PROFESSION (LEGAL PRACTICE MANAGEMENT COURSE) RULES 2015

Call for papers. Experiential marketing applied to watchmaking

Master of Communication Studies New Media and Society in Europe

Academic Calendar - UNDERGRADUATE. All Other Classes Begin; Late Registration Begins. Last Day to Drop a Class without a W on Transcript;

PRACTICAL INFORMATION

Information Security Specialist Training on the Basis of ISO/IEC 27002

Pinning and Graduation Ceremony at St. Aloysius. Fall Semester and Term B Classes End. St Francis School of Radiography Seniors Spring Semester

Investment Funds. Professional Qualification in. Professional Qualification

Security Controls What Works. Southside Virginia Community College: Security Awareness

USF Graduate Catalog SECTION 18.

States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent

4 WEEK SUMMER PROGRAM - PARIS

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

6-8, avenue Blaise Pascal Cité Descartes Champs-sur-Marne Marne-la-Vallée Cedex 2

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, PARIS

Our Commitment to Information Security

Request for Proposal: Development of a Guide to International Standards on Auditing for Use in Audits of Small- and Medium-sized Entities

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

National Cyber Security Policy -2013

Document Hierarchy of Information Security. Corporate Security Policy. Information Security Standard. General Directive(s) Specific Directive(s)

Graduate Certificate in Internal Auditing

InfoSec Academy Forensics Track

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority

CYBERSECURITY EXAMINATION SWEEP SUMMARY

Master Programme in Customs & Supply Chain Compliance

3000_115 Competency Standard: Certified Practitioner in Asset Management (CPAM)

GENERAL COURSE INFORMATION

RISK. Outsourcing Risk Management How to Focus on Controlling and Managing IT Vendors under RBI Guidelines

MEHARI Overview. April Methods working group. Please post your questions and comments on the forum:

Developing a robust cyber security governance framework 16 April 2015

NEEDS AND DISABILITIES MA ND DISABILITIES MA SPECIAL ECIAL EDUCATIONAL NEEDS AL NEEDS AND DISABILITIES S MA SPECIAL EDUCATIONAL

Master of Science Industrial Engineering and Operations Research

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, Sample not collected

Transcription:

Information session April 2nd, 2015 Master 2 in Information System Security Management (ISSM)

Master s team Prof. Yves Le Traon Study director Rita Giannini Study coordinator

Master s team Nicolas Mayer Study director Bahija Sebane Training officer Chrystel Petiteville Training assistant

Other actors CLUb de la Sécurité des Systèmes d'information Luxembourgeois Portail de la sécurité de l'information du Ministère de l'economie et du Commerce extérieur Collège des Professionnels de la Sécurité de l Information Commission de Surveillance du Secteur Financier

Motivation Business relies on information systems The availability of these systems becomes critical The number of security incidents is growing rapidly Security management is now crucial Legal and regulatory constraints are arising Then Needs for training information security professionals and experts! Requires advanced and diverse competencies

Public Consultants / auditors Business owner CISO (Chief Information Security Officer) Professional people responsible for information security IT engineers, IT Managers Related Professions (Lawers, cybercops, etc.) Big companies SMEs administrations Financial sector Health sector Industries Public sector Other sectors

Objective Train experienced professionals to give skills of the chief information security officer (CISO)

The CISO (Chief Information Security Officer) Corporate Executive A job that deals with the whole organisation «Compliance» department «Risk Management» department IT department User services

Interdisciplinary training Legislation and regulation Security standards Security Audit Methodologies For information security Organisation Technologies For securing information and systems Enterprise management Project management Risk Management Security management

Program 8 9 12 10 12 1 14 4

Program Module 1 - Understanding organisations and management 9 ECTS Course hours Organisational theory and change 12 Architecture and business strategy 18 Financial Management 6 Project Management 12 IT Service Management 6 TOTAL 54

Program Module 2 Regulatory frameworks 8 ECTS Course hours Legal and regulatory aspects 18 Law enforcement 12 Special businesses and impacts 18 TOTAL 48

Program Module 3 Information Security Management 12 ECTS Course hours Information Security Management System ISMS 12 Risk analysis practices 6 Risk analysis and management 12 Electronic records management 12 Security Policy 12 Compliance Assurance 12 Business Continuity Management 6 TOTAL 72

Program Module 4 Technical aspects 12 ECTS Course hours Information Security Technologies 1 12 Information Security Technologies 2 12 Communication, information processing and persistence 1 Communication, information processing and persistence 2 Threats, attacks and controls 12 12 24 TOTAL 72

Program Module 5 Human aspects 4 ECTS Course hours Human risk 12 Human communication 12 TOTAL 24

Program Module 6 Professional part 15 ECTS Course hours Working in information security management 6 Professional project n/a

ISED Information Security Education Day 2015 Theme: Understanding Data Protection challenges The ISED is an event that aims providing each year new knowledge on a hot-topic related to security and privacy. Primarily it targets the current and former students of the professional (Master en management de la sécurité des systèmes d'information). However the ISED also provides an ideal forum where academics and practitioners can learn about the different facets of a key-topic, exchange, discuss ideas, and compare experiences. Friday 22nd May 2015

Program = 6 modules 1 9 ECTS Understanding organisations and management 8 ECTS Regulatory frameworks 2 6 15 ECTS Professional part 12 ECTS Information security Management 3 5 4 ECTS Human aspects 12 ECTS Technical aspects 4

Schedule 1 2 3 4 5 6 Understanding organisations and management Regulatory frameworks Information security Management Technical aspects Working in information security management Human aspects Professional part semester 1 semester 2 semester 3 semester 4 60 ECTS

1st promotion

Professional discussions in a good atmosphere!

Practical information Calendar 276 hours: academic courses In english Two academic years, in 20/25 sessions of 2 consecutive days Friday and Saturday from 9.00 a.m. to 5.30 p.m. The exact schedule is given at the beginning of each semester 4 to 6 months: professional project Place CRP Henri Tudor on Fridays Université du Luxembourg on Saturdays Fees: 4600 * including Registration at the University of Luxembourg Training fees * FEES MAY CHANGE Electronic communication tool Moodle Course start date September 18th, 2015

Registration 1/ Preselection application: April 24th - rita.giannini@uni.lu Resumé + cover letter + letter from employer if possible Minimum requirement = BAC+4 level (or 3 years of experience for each missing year) and a background/experience in IT 2/ Interview: TBD 3/ Final registration online via http://wwwfr.uni.lu/etudiants/inscriptions_reinscriptions/inscriptions_ue_choix_du_master/master_en_ management_de_la_securite_des_systemes_d_information_professionnel 4/ Course start date: September 18th, 2014

Contact Rita Giannini +352 46 66 44 58 16 rita.giannini@uni.lu