Data Security Training
Our Data security workshops and courses help your organisation to protect digital data from the malicious actions of unauthorized users, such as a cyberattack or a data breach.
Please select the course that you’re interested in
Please select the course that you are interested in
Security Program Development Workshop (4 days)
Course Overview
- Information Security Governance
- Information Risk Management
- Information Security Program Development
- Information Security Program Management
Audience:
This four-day workshop is designed to provide participants an adequate approach to apply effective risk management and good governance throughout the organization.
Cybersecurity is a growing and rapidly changing field, and it is not uncommon for companies to first turn to technical security solutions without addressing how those solutions are going to be implemented, maintained and managed on a day-to-day basis. Too often organizations fail to implement proper security policies or procedures. As a result, weak practices persist that undermine security and expose assets to significant risk.
Prerequisite:
While there are no formal prerequisites, all attendees are expected to have a basic understanding of Information and Cyber Security management.
Duration:
This is a four-day half-day Security Program Development Workshop. The course starts at 09:30 and runs until 16:30.
Alternate timings can be arranged upon request. The course can be held on a date that suits you.
Location:
Our Security Program Development Workshop will be delivered Online Remotely using online training platforms. It can also be run at our training venue near Liverpool Street (London) or any preferred location in the UK or Europe.
Security Program Development Workshop Outline
INFORMATION SECURITY GOVERNANCEInformation Security Governance Overview Elements of Effective Information Security Governance Information Security Governance Metrics Information Security Strategy Development Action Plan to Implement Strategy INFORMATION RISK MANAGEMENTRisk Management Strategy Effective Information Risk Management Risk Assessment and Analysis Methodologies Security Control Baselines Risk Monitoring and Communication |
INFORMATION SECURITY PROGRAM DEVELOPMENTInformation Security Program Objectives Information Security Program Concepts Scope and Charter of an Information Security Program The Information Security Management Framework Information Security Framework Components Defining an Information Security Program Road Map Information Security Infrastructure and Architecture INFORMATION SECURITY PROGRAM MANAGEMENTSecurity Program Administrative Activities Security Program Services and Operational Activities Controls and Countermeasures Security Program Metrics and Monitoring Common Information Security Program Challenges |
One to One
(which includes a tailor-made training programme for the individual where they can mix and match the topics from various levels to get the most cost-effective training
Group for up to 8 learners
What Our Clients Say
Extras
This is a sample of some of the Short training videos. Please note that you can get access to many more, once you have done a course with us and are registered as one of our delegates.