BUILD YOUR CYBERSECURITY SKILLS WITH NRB



Similar documents
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

Training Catalogue

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

IBM Penetration Testing Services

Cyber Security solutions

McAfee Security Architectures for the Public Sector

Security Controls What Works. Southside Virginia Community College: Security Awareness

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

Smart Security. Smart Compliance.

G-Cloud IV Services Service Definition Accenture Cloud Security Services

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

EXAM PREPARATION GUIDE

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together.

HP Cyber Security Control Cyber Insight & Defence

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Information Security Management Systems

Security metrics to improve information security management

Information Security ISO Standards. Feb 11, Glen Bruce Director, Enterprise Risk Security & Privacy

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

Governance and Management of Information Security

GRC Stack Research Sponsorship

Cybersecurity The role of Internal Audit

Bellevue University Cybersecurity Programs & Courses

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Candidate s Handbook

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

ISE Northeast Executive Forum and Awards

EC-Council. Certified Ethical Hacker. Program Brochure

The Next Generation of Security Leaders

Certified Information Security Manager (CISM)

Firewall Administration and Management

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Reputation. Further excellence. business continuity. risk management. Data security

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Cloud Security. DLT Solutions LLC June #DLTCloud

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

CYBER SECURITY TRAINING SAFE AND SECURE

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

Logging In: Auditing Cybersecurity in an Unsecure World

Address C-level Cybersecurity issues to enable and secure Digital transformation

CAST Center for Advanced Security Training

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

Attachment A. Identification of Risks/Cybersecurity Governance

Applying IBM Security solutions to the NIST Cybersecurity Framework

IBM Internet Security Systems October FISMA Compliance A Holistic Approach to FISMA and Information Security

The Benefits of an Integrated Approach to Security in the Cloud

KEY TRENDS AND DRIVERS OF SECURITY

Understanding Management Systems Concepts

Defending against modern threats Kruger National Park ICCWS 2015

Privacy & Security Requirements: from EHRs to PHRs

Security Transcends Technology

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Qualification details

Information Blue Valley Schools FEBRUARY 2015

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Cybersecurity Strategic Consulting

ADRIAN DAVIS INFORMATION SECURITY FORUM

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,

Preparation for ISO OH&S Management Systems

Hackers are here. Where are you?

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

InfoSec Academy Application & Secure Code Track

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Asia Policy Partners LLC 2015

TCS Managed Security Services

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

When Recognition Matters WHITEPAPER ISO RISK MANAGEMENT PRINCIPLES AND GUIDELINES.

An Overview of ISO/IEC family of Information Security Management System Standards

What Makes PMI Certifications Stand Apart?

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

CGI Cyber Risk Advisory and Management Services for Insurers

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

GCERT BALTIC JSC. Tel.: Vilnius, Lithuania GCERT BALTIC JSC. ISO certification and training

Cyber Risks in the Boardroom

Need to protect your information? Take action with BSI s ISO/IEC

CYBER SECURITY SERVICES PWNED

Key Speculations & Problems faced by Cloud service user s in Today s time. Wipro Recommendation: GRC Framework for Cloud Computing

ANITIAN INTELLIGENT INFORMATION SECURITY INTELLIGENT INFORMATION SECURITY

Transcription:

BUILD YOUR CYBERSECURITY SKILLS WITH NRB

BECOME A PECB CERTIFIED ISO 27001 AUDITOR OR INSTRUCTOR NRB established a partnership with the Professional Evaluation and Certification Board (PECB) to enrich its service catalogue regarding information security and risk management (ISRM) training in Belgium. Our aim is to coach new Trainer candidates in order to deliver information security and risk management training sessions to customers at the pace of the growing market demand. Philippe WANSON, a member of the ISRM practice since September 2015 and a PECB Certified Trainer since 2009, drives the delivery of training for our customers. Philippe Wanson Sr Consultant, NRB - Member of the ISRM practice

ABOUT PECB The Professional Evaluation and Certification Board (PECB) offers qualified individuals certification to various international standards, including ISO/IEC 27001 Information Security Management Systems, ISO/IEC 27005 Information Risk Management, ISO/IEC 31000 Enterprise Risk Management, ISO 9001 Quality Management Systems, ISO 14001 Environmental Management Systems, ISO/IEC 20000 IT Service Management, ISO 22301 Business Continuity Management Systems as well as to other frameworks such as OHSAS 18001, ISO 22000, ISO 26000 and ISO 28000. PECB has earned a reputation for integrity, value and best practice by providing this assurance through the evaluation and certification of professionals against rigorous, internationally recognized competence requirements. Its mission is to provide its clients comprehensive personnel examination and certification services. More information can be found on the PECB website. Credibility on the market and recognition by peers is the true value of the PECB certification

SECURITY STANDARDS AND FRAMEWORKS ARE INCREASINGLY BEING ADOPTED BY BUSINESSES AS PROOF OF SECURITY CREDENTIALS. OBJECTIVE Educate the customer and its employees in CyberSecurity. Improve employees performance through education to make sure they acquire the appropriate Security Skills & Competences with regards to their roles and responsibilities. TRAINING CATALOGUE We provide security training based on international ISO standards and best practices. All training topics are available out of the box in four different formats: INTRODUCTION FOUNDATIONS LEAD AUDITOR LEAD IMPLEMENTER 1 DAY 2 DAYS 5 DAYS 5 DAYS ISO27001 Infomation Security Management Systems ISO27005 Information Risk Management, Mehari, Ebios, Octave ISO31000 Enterprise Risk Management ISO22301 Business Continuity Management ISO 14000 Environment Management ISO 27035 Security Incident Management ISO 9001 Quality Management System ISO29100 Certified Privacy Lead Implementer ISO37500 Certified Oustsourcing Manager New courses for certification are available every year through an operational partnership with PECB.

DELIVERABLES Instructor led classroom with PECB Certified Trainer Trained & qualified people Accreditation upon successfull completion of the exam: Training includes worldwide recognized certification. Most of our security training sessions lead to a certification with worldwide recognition by PECB, accredited by International Accreditation Service (IAS). LOCATION NRB delivers trainings in the most flexible way: At NRB premises in Belgium and Luxembourg. At customer premises (on-demand training). Any other place on request.

TRAINER SKILLS Clarity and precision Good attitude & presentation Clearly explains the difficulties Uses illustrations, examples Uses training guide, PC, overhead projector, white board, Gives clear instructions Controls the skills of the participants Demonstrates very clearly all technical operations needed NRB SECURITY PRACTICE CyberSecurity is more than a few new products or gadgets. It s about a complete, integrated mind set, involving both proactive and reactive measures, people, processes and technology. CyberSecurity is also about understanding the business and aligning any project to the critical assets of the organization. It is about monitoring, testing, building and maintaining a process and about creating a platform that lets you truly manage your risks in a world where the cost and damages of breaches continue to rise. The NRB team of Information and CyberSecurity professionals plays the key role of trusted advisor to help the customer achieve his objective: connecting security to business agility. Our experts base their approach on the NIST (National Institute of Standards) and ISO (International Organization for Standardization) Cybersecurity frameworks for best practices. The main advantage of the NIST and ISO approaches consists in using business drivers to guide CyberSecurity activities and in considering cybersecurity risks as part of the organisation s risk management processes. Our extensive portfolio of solutions and services can strengthen the prevention and management of CyberSecurity for critical data.

G - Security Governance R - Security Risk Management C - Security Compliance ISO 27001 Audit & Implementation IT Security Strategy & Roadmap, CIO/CISO Advisory GRC & TRAINING Industrial Control Systems (SCADA) Security Data Security Governance Data Classification Data Privacy & Protection INFORMATION & DATA SECURITY General Data Protection Regulation (EU-GDPR) Data Leakage Protection Data Leakage Detection Identity Access Governance Identity Access Management Web Access Management IDENTITY & ACCESS MANAGEMENT Single Sign-On Privileged Account Security Infrastructure Security Architecture Firewall Management Penetration Testing Vulnerability Scanning Ethical Hacking INFRASTRUCTURE & APPLICATION SECURITY Endpoint Security Application Security Testing Security Incident & Event Management Security Operations Center SIEM & SECURITY INTELLIGENCE Security Threat Intelligence

Philippe Wanson Senior Consultant - Information Security, Risk Management & Audit e. philippe.wanson@trasysgroup.com * m. +32 (0)486 46 86 50 Jan Ickroth Business Development Manager Solution Sales e. jan.ickroth@trasysgroup.com * m. +32 (0)475 45 19 69 (*) Trays Group is part of The NRB Group since October 2015 and will be fully integrated with NRB by the 1st of January 2017. e. info@nrb.be t. +32 (0)4 249 72 11 f. +32 (0)4 248 11 70 www.nrb.be @daringtocommit linkedin.com/company/nrb NRB S.A. / nv Parc Industriel des Hauts-Sarts 2e Avenue 65 4040 Herstal Rue d Arlon / Aarlenstraat 53 1040 Bruxelles / Brussel Designed and printed at NRB