Ultimate Security Workshop

Join us!

  • 00Days
  • 00Hours
  • 00Minutes
  • 00Seconds

Topics

Initiate

A. Prepare

  1. Initiation
    • Readiness Assessment
    • Challenge Treatment
    • Information Containers’ Inventory
  2. Business Cognition
    • Organization Structure
    • Interested Parties
    • Business Goals & Objectives
    • Business Strategy
    • Jobs Information
    • Business Problems
    • Products & Services
    • Training Records
    • Obligations
    • Environment Analysis
  3. Asset Inventory
    • Information
    • Software
    • Hardware
    • Infrastructure
    • Storage
    • Human Resource
    • Safe Area
    • Intangible
  4. Business Processes Analysis
    • List of Processes
    • Process Mapping
    • Process Documentation

B. Plan

  1. Project Plan
    • Primary Assessment
    • Project Plan Development
  2. Security Architecture
    • Security Organization
    • Security Standards
    • Security Laws & Frameworks
    • Security Maturity Models
  3. Scope Definition
    • Internal – External Issues
  4. Gap Analysis
    • ISO27001 SOA
    • C2M2
    • CIS
    • CSF
    • GDPR
    • PEDIDA
    • CMM
    • ISM3
  5. Asset Evaluation
    • Goals Weighing
    • Process Weighing
    • Asset Impact Assessment
    • Financial Value of Assets
    • Asset Evaluation

Implement

C. Design

  1. Risk Assessment
    • Risk Identification
    • Risk Evaluation
  2. Security Strategic Plan
    • Security Goals Definition
    • Security Objectives Definition
    • Risk Acceptance Level
    • Security Strategy
  3. Security Policy Development
    • Security Policy Development
    • Security Technical Policies Development
    • Security Procedures Development
  4. Risk Treatment
    • RTP Development
    • RTP Effectiveness Assessment
  5. Training & Awareness
    • Training Plan Development
    • Awareness Plan Development
  6. Business Continuity
    • Business Continuity & Disaster Recovery Plan Development

D. Implement

  1. Implementation Planning
    • Budgeting & ROSI Calculation
    • Implementation Plan Development
  2. Implementation Management
    • Implementation Project Management Plan Development

Intelligence

E. Operate

  1. Operation Management
    • Implementation Project Management

Improvement

F. Optimize

  1. Audit
    • Effectiveness Assessment
    • Internal Audit
  2. Review
    • Management Review
    • Corrective Actions
  3. Improvement
    • Corrective Actions Implementation

Hands-On

  • Assessing your current security status
  • Evaluating the urgency of implementing an Information Security Management System (ISMS)
  • Defining the necessity and goals of Information Security implementation
  • Establishing appropriate implementation boundaries
  • Readiness assessment for implementation
  • Overcoming challenges and ensuring a 100% successful implementation
  • Developing an investment plan aligned with business analysis
  • Conducting asset inventory and identifying critical business processes
  • Structuring a security organization
  • Defining project scope and analyzing gaps against security standards, frameworks, best practices, and legal requirements
  • Utilizing professional, advanced methods for asset evaluation, risk assessment, and risk treatment
  • Formulating a Security Strategic Plan
  • Creating security policies, procedures, and a comprehensive Training & Awareness program
  • Developing Business Continuity Planning (BCP) and Disaster Recovery Plans (DRP)
  • Budgeting for information security and calculating Return on Security Investment (ROSI)
  • Planning for Real-Time Protection (RTP) implementation
  • Managing project implementation and operational aspects
  • Conducting internal audits and assessing the effectiveness of Real-Time Protection
  • Implementing improvement plans

Language

English

Keywords