Managerial Primer for Ensuring Information Security


Dr. Robert E. Davis obtained a Bachelor of Business Administration in Accounting and Business Law, a Master of Business Administration in Management Information Systems, and a Doctor of Business Administration in Information Systems Management from Temple, West Chester, and Walden University; respectively. Moreover, during his twenty years of involvement in education, Dr. Davis acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology. Dr. Davis also obtained the Certified Information Systems Auditor (CISA) certificate - after passing the 198........

Overview

Usually, a formal information security governance (ISG) program is required to promote information assets safeguarding. ISG programs should ensure the Control Objectives for Information and related Technology (COBIT) framework confidentiality, integrity, availability, compliance, and reliability information criteria compromise does not occur through gaps in controls. Therefore, the information security program and associated systems, processes, and activities need regular quality and compliance assessments. Monitoring and evaluating information security drives assurances provided or obtained through due care and due diligence as well as enables managerial fiduciary oversight expectations fulfilment. Planning and organizing are essential to organizational cohesiveness.

Why should you attend this webinar?

Instituting and sustaining ISG requires comprehensive planning and organizing; robust acquisitions and implementations; effective delivery and support; as well as continuous monitoring and evaluation to address the myriad of managerial, operational, and technical issues that can thwart satisfying an enterprise's declared mission. Consequently, information security requires an adaptive balance between sound management and applied technology. Sound management enables assuring adequate asset safeguarding while applied technology can introduce efficiencies for addressing potential external or internal threats.

Information security design, deployment, and assurance require dedication to continuous improvement to ensure optimum effectiveness and efficiency. Whereby, confirmation of compliance with legislation, regulations, policies, directives, procedures, standards, and rules enable asserting superior ISG. Nonetheless, monitoring and evaluating the current state of implemented controls may take a variety of forms, including control self-assessments and information technology (IT) audits. Furthermore, an IT auditor may not be the individual who executes an organization's information security internal control review (ICR). However, an IT auditor may subsequently assess an ICR for effectiveness and/or efficiency. In the regulatory arena, a negative finding, coupled with prompt corrective actions can mitigate civilly and criminal enforcement penalties, thereby potentially reducing or avoiding legal risks.

Areas Covered in the Session:

  • ISG social responsibility
  • Data protection management
  • Alternative ISG frameworks
  • Organizational structure considerations
  • ISG effectiveness measurement
  • Information security culture

Who can Benefit:

  • Audit Committee Members
  • Risk Management Managers
  • External Auditors
  • Internal Auditors
  • Chief Executive Officers
  • Chief Information Officers
  • Compliance Managers
  • Chief Information Security Officers
  • Information Technology professionals
  • Control Self-Assessment personnel


Webinar Id: LSHCRKD001

Training Options:

Duration: 60 mins

  19-Mar-2020

 10:00 AM PT | 01:00 PM ET

 Single Attendee: [Only for one participant]

$179 (Live)                    $275 (Live + Recorded)

 Multiple Attendee: [For a group of 2-5 participants]

$368 (Live)                    $649 (Live + Recorded)

 Corporate Attendee: [For a group of 6-10 Participants]

$736 (Live)                    $1067 (Live + Recorded)

 Recorded: [Six month unlimited access]

$231 (Single Attendee) $699 (Unlimited Attendee)

Refund Policy
Past Webinar: CPG and Retail
HIPAA Privacy and Novel Corona....
Presenter: Brian L Tuttle
6 months unlimited
Price: $339
HIPAA Changes 2020 - What's ne....
Presenter: Brian L Tuttle
6 months unlimited
Price: $301

More Webinar

Insert title here
Pay Pal Logo   PayPal Verified Logo   GoDaddy Certified
Copyright © 2020 Compliance Key . All Rights Reserved. Back to Top