
Enterprise Data Security & Risk Management
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
---|
Data security for today's organizations is an ever increasing difficult task, especially with the increasing sophistication and volume of attacks aimed at stealing information. Protecting data becomes an perpetual challenge, with the view of an increased usage of mobile devices, such as laptops and smart phones. Furthermore, disaffected internal employees often have access to sensitive information. As companies expand and acquire more data, the need for a well-managed solution that integrates multiple data-protection technologies to provide comprehensive enterprise coverage, along with persistent data protection, becomes a necessity across the enterprise. This can only be achieved with a credible appreciation of risk.
In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. An appropriate risk management framework can bring visibility to key business and compliance risks and enable an organization to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved in focusing on relevant areas of IT risk of data security within the enterprise environment.
Using international standards, an effective risk management control framework and current best practice, the aim of this seminar will advise senior executives and management on how to implement secure safeguards within a virtually borderless environment.
During the training the delegates will:
This training has been designed for individuals involved in, Risk Assessment, Information Security and Management of IT Systems and Enterprise Data Security. It is particular benefit to Application Service Providers, Network Architecture Personnel, individuals in regards to IT Risk, Policy and Compliance in addition to Security Service Vendors and specialist investigators and those with a responsibility for managing and securing information assets.
Development of Enterprise Architecture
Risk Assessment and IT Risk Management
The Need and Benefits for Information Security
Data Security
Legal and Regulatory Considerations
Data Sharing and Best Practice
Overview of International Standards and Best Practice
Introduction to computer system design and enterprise design security
Provisions and challenges
A variety of methodologies will be used during the course that includes:
To be advice as per course location. This rate includes participant’s manual, Hands-Outs, buffet lunch, coffee/tea on arrival, morning & afternoon of each day.
International Center for Training & Development (ICTD) will award an internationally recognized certificate(s) for each delegate on completion of training.
Daily Course Timings:
08:00 - 08:20 Morning Coffee / Tea
08:20 - 10:00 First Session
10:00 - 10:20 Coffee / Tea / Snacks
10:20 - 12:20 Second Session
12:20 - 13:30 Lunch Break & Prayer Break
13:30 - 15:00 Last Session