Events
Organizers
Venues
Add Event
Subscribe
Subscribe
Sign In
Hotels
Car Rental
Tours & Transport
Event Tickets
Information Security Management 2016
07 Nov - 16 Dec, 2016
Online Event
Home
Information Security Management 2016
Description
Topics
Information Security Governance
Is there an adequate organisational structure in place to protect your information?
Do the board and senior management direct and support your information security efforts?
What controls have been established to monitor the performance of your information security arrangements?
Importance of Information Security and Risk Management
How your risks determine which assets require protection
What is covered by information security, and its business relevance
Adopt a best practice framework
Choose an approach to form control objectives and select appropriate controls
Training and Content Monitoring
Mechanisms to verify and validate your information
Awareness of and training in information security
How are mechanisms monitored on a daily basis?
Assessing your defences against their vulnerability
Asset Classification and Control
Do you have a complete asset inventory and how is this maintained?
What information assets do you wish to protect?
Information classification systems
Communications and Operations Management
System planning and acceptance procedures
What policies, procedures and responsibilities are in existance regarding your IT operations?
Housekeeping arrangements to maintain the integrity and availability of information services
Protection to counteract malicious software
Measures to prevent damage to assets and interruption of business activities and to protect data and information exchanges in e-business activities
Network security controls
Physical and Environmental Security
Protection of your IT equipment with respect to procurement, security, and maintenance and disposal
Arrangements to provide appropriate physical security for your information assets
Systems Development and Maintenance
Security arrangements for the ongoing maintenance of existing systems
Security requirements for new systems
Security arrangements with regard to the development, support, and production environments
Protection of application system files
Access Control Management
User access management procedures and the asociated user responsibilities
Which business roles need system access?
Monitoring of system access mechanisms
Network access controls, computer access controls, and application access controls
ISO/IEC 17799 and BS7799 compliance auditing using the CobiT Audit Guideline
CobiT Audit guidelines
ISO/IEC 17799 and BS7799 compliance auditing
Conclusion
Using the CobiT Audit guidelines to perform BS7799 compliance audits
Business Continuity Management
Business continuity frameworks
Business continuity processes
Updating business continuity plans
Testing business continuity plans
Who should Attend
Business Continuity Planners, Asset Managers, Risk Managers
CIOs, CISOs and anyone who has direct line responsibility for information security
Company Secretaries, Finance Directors and Auditors
Legal Advisors and Corporate Security Consultants
Past Events
Information Security Management 2016 - 07 Nov - 16 Dec, 2016, Online Event
(55214)
Information Security Management 2016 - 21 Apr 2016, Webinar
(54751)
Information Security Management 2015 - 17 Sep 2015, Webinar
(45562)
Important
Please, check "Information Security Management" official website for possible changes, before making any traveling arrangements
Event Categories
Technology:
Information Technology (IT), IT Security
Other Events with Similar Categories
Technology Conferences
Information Technology (IT) Conferences
IT Security Conferences
Novel Technologies Conferences
Science and Technology Conferences
Systems Conferences
Information and Communication Engineering Conferences
Digital Transformation Conferences
Computer Conferences
Data Conferences
Cio Conferences
Chief Information Officer Conferences
Information System Conferences
Trojan Horse Conferences
Privileges Conferences
Secret Conferences
Classified Conferences
Ciso Conferences
Zero Trust Conferences
Business Technologies Conferences
User Interfaces Conferences
Computing Conferences
Information Technology Conferences
It Conferences
Cios Conferences
Chief Information Officers Conferences
Business Technology Conferences
Infotech Conferences
Business Tech Conferences
Information Systems Conferences
Ict Conferences
Information Management Conferences
Integrated Systems Conferences
Fuzzy Systems Conferences
Infosec Conferences
Cyber Conferences
Cybersecurity Conferences
Authorization Conferences
Confidentiality Conferences
Phishing Attacks Conferences
Trojan Horse Threats Conferences
Identification Conferences
Intrusion Detection Conferences
Access Privileges Conferences
Authentication Conferences
Cryptography Conferences
Vulnerability Conferences
Health Informatics Conferences
Human Computer Interaction Conferences
Data Security Conferences
Distributed Systems Conferences
Quantum Programming Conferences
Software Testing Conferences
Computer Security Conferences
Game Development Conferences
Information Security Conferences
Recommender Systems Conferences
Software Architecture Conferences
Game Engineering Conferences
Mobile Security Conferences
Programming Languages Conferences
Software Development Conferences
Other Events with Similar Location or Organizer
Virtual (Online) Events
Events by IMF Academy - International Management Forum
Featured Conferences & Exhibitions
AI World Congress 2024
Biotechnology for the Non-Biotechnologist
International Conference of Leadership Business and Managment (ICLBM)
International Conference on Trends and Innovations in Management, Engineering, Sciences and Humanities (ICTIMESH 2024)
International Crop Science Conference & Exhibition
74th New Orleans Academy of Ophthalmology (NOAO) Annual Symposium 2025
ConveyUX
INTED2025 - The 19th International Technology, Education and Development Conference
EnviroTech Athens 2025
35th Annual Art and Science of Health Promotion Conference
The Learning Ideas Conference 2025
Primary Care Hawaii Conference - Caring for the Active and Athletic Patient
Articles / News / Press releases
The Value of IT conferences for Information Technology Professionals
Understanding the usefulness of Technology conferences
Technology conferences - a useful tool
A Technology conference is a great way to expand your knowledge
Understanding the effectiveness of technology conferences
Search for Events
Search
Clear