How Solid Is Your Information Security Program? Are You Cyber Ready? - ASN451WEB
This webinar covers practical information to help auditors provide reasonable assurance about the effectiveness of controls regarding the confidentiality integrity, and availability of sensitive data. There are many security concerns as experts generally state that “It’s not a matter of if but when” and “there are those who have been attacked and those that have not realized it yet”. This webinar helps students better understand the components of a complete information security program.
Who should attend?
Financial, Operational and Information Technology auditors and Audit management, Information Security and Risk Management professionals who need to know about how to assess the cyber readiness of an Information Security Program.
Prerequisites - None
You will learn the components of an information security program, and the strategies for their implementation and monitoring, how risk assessments and impact analyses are conducted, and the key elements of an incident response plan.
- Information Security Governance
- Information Security Strategy
- Information Security Program Gap Analysis/Maturity Modeling
- Information Security Program
- Information Security Risk Assessment- Controls: Confidentiality; Integrity; Availability
- Business Impact Analysis
- Incident Management
- Business Continuity
- Disaster Recovery (Backup and Restoration)
- Vulnerability Assessment (Patch Management)
- Penetration Testing
- Vendor Management
Certification / Credits
NASBA Certified CPE: 3 Credits Information Technology
At ACI Learning, we train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, we're with you every step of the way. We believe that training is not a...