Self Auditing Your Cyber Security Program To Ensure To Mitigate Risks
01:00 PM ET | 10:00 AM PT | 12:00 PM CT Duration 60 Minutes
Webinar Includes : All the training handouts , certificate ,Q/A and 60 mins Live Webinar
"Dr. Michael C. Redmond, PhD, is a certified project manager, PMP, has two masters’ certifications in business continuity/disaster recovery MBCP and FBCI and is certified in emergency management"
Information is critical for the successful management and smooth operation
To manage information security in a company you need a Self Auditing Your Cyber Security Program To Ensure To Mitigate Risks.
We will cover how to audit your program in relation to establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system." In addition we will discuss which standards to reference to effectively ensure your organization has a robust security program for your organization's vital information assets.
Protecting your organization's information is critical for the successful management and smooth operation of your organization.
A self audit helps manage your information security management systems aid your organization in managing and protecting your valuable data and information assets. A good programnot only helps to keep your confidential information secure but also provides customers and stakeholders with a confidence in your risk management system while ensuring you are meeting legal obligations.
Why Should you Attend
Attend this session by our expert speaker, Dr. Michael C. Redmond, and learn to audit ISO 27001 and Information/Cyber Security. Michael will help your organization to manage the security of the assets such as intellectual property, financial information, information or employee details entrusted to you by third parties through an effective auditing program that audits controls associated with the ISO 27001 standard. This session will enable you to gain knowledge and better audit information security management.
• Risk assessment
• Security policy
• Organization of information security
• Asset management
• Human resources security
• Physical and environmental security
• Communications and operations management
• Access control
• Information systems acquisition, development and maintenance
• Information security incident management
• Business continuity management
Who will Benefit
• Security Planners
• Technology Managers
• All Large Corporations
• Association of Contingency Planners
• Audit Associations
• Internal Auditors Association
• Continuity Planners
• Business Continuity Planners
• Disaster Recovery Continuity Planners
• Risk Managers
• Internal Auditors
Industries who can attend
This 60-minute online course is intended for professionals in the all Industry