Cyber Security Management Principles - 12 - 15 November 2017 Dubai, UAE


September 22, 2017


  home    |    360 BSI    |    new events    |    past events    |    partners    |     blog    |    contact    |    sitemap  


360BSI Image


“Leadership is action, not position.” - Donald H. McGannon











 

BEST SELLERS!

Document & Information Management, Security, Retention & Archiving

 


REGISTER TODAY!



Behavioral Based Safety (BBS) & Safety Leadership





Customer Service
Tel : +6016 3326 360
Tel : +603 9205 7772
Fax: +603 9205 7788

   

Cyber Security Management Principles

Dubai, UAE

12 - 15 November 2017

Eventbrite - Cybersecurity Management Principles, Sept 2017 Dubai

This course covers effective strategies, techniques, systems, polices, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.

In today’s world and further into the digital future, all organizations face an ever-increasing number of information-related security challenges and risks against a backdrop of increasing national and global compliance, and audit standards and legislation.

Cybersecurity is the protection of data from theft and damage, business information, people’s identities, and how all businesses can be better equipped to work more safely in an increasingly online world where sensitive and personal information is stored, shared, and communicated.

This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. Participants will develop key skills and core competencies that will allow them to meet the ever-changing information security demands of the 21st century.

Course Participants will:

  • Understand today’s and tomorrow’s cybersecurity and cybercrime threats, issues, and risks; how to set up policies, train users, create strategies, and implement systems and tools to help protect data, information and people’s identities
  • Manage the growing volume of confidential, sensitive business information and data to protect, keep safe, and communicate securely against a backdrop of increasing cyber threats, as well as privacy, legal, and compliance regulations
  • Develop strategies and ways of working to improve detection of cybersecurity threats and improve information compliance
  • Understand the security-related international information compliance and regulations, including industry specific standards
  • Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cybersecurity

 

Who should attend:

  • Vice Presidents, Directors, General Managers
  • Chief Information Officers
  • Chief Security Officers
  • Chief Information Security Officers
  • Chief Technology Officers
  • Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment, IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning

 

Contact us for further details.




 

 







© Copyright 2009, 360 BSI (M) Sdn Bhd