Implementing IT Security in Your Organization: Risk Analysis & Methodology

This program provides the necessary step by step approach and methodology for systematically evaluating an information system's security.

  • At the end of this course the participants will be able to:
  • Know the information as a source of competitive advantage
  • Know the needs for Decision Making
  • Limit Information Access
  • Make a Systematic evaluation of information system security.
  • IT Practitioners
  • Cybersecurity Staff

  • Practical Issues - The Security Situation
  • Security Strategic Issues
  • Industry Methodologies, Standards & Best Practices

  • Business Mapping of Operations to Identify Security Risks - Flow Charts
  • How Secure are Your Computer Security Fraud Prevention Practices?
  • How safe is your computer system from  Viruses, hacking, and fraud?

  • Do you have a problem?
  • How serious is it?
  • What should you do?
  • How to evaluate the risk?
  • How to implement controls?

  • How to identify information assets and controls?
  • How to quantify risks, likely damage causes for concern?
  • To Understand the responses to any threat know which to use.
  • Check your IT infrastructure - Identify weak links
  • Review the success of key staff members in implementing controls

  • Clarify your vulnerability to outsiders and staff - including providing them an Action Plan to Preserve Data Security on their Systems and Work Methods
  • Planning the Security System
  • Information Technology Security Standards Adoption
  • Implementing Computer Security Improvements

Related Courses