Best Management Practices in (IT) Security

19-05-2025 - 23-05-2025 3800 Istanbul

Course Introduction:

 

Delegates will have a blue print for building an effective security program leading to eventual accreditation to ISO17799. Delegates will also gain skills to get agreement from disparate interest groups on security issues. In addition they will receive a security audit questionnaire and be taught how to use it to produce a low risk installation.

 

Course Objectives:

 

 

Delegates will learn how to:

  • Establish and maintain a workable information security program.
  • Plan and administer the program
  • What the implications of ISO17799 are to the corporation
  • Getting continuing support from the user departments and IT staff
  • How to work to advantage with the Security Manager
  • How to analyze and reduce security threats
  • How to creatively co-operate in an IT crime investigation
  • How to write the corporate security manual
  • Convincingly present the results of project studies

 

Who Should Attend?

 

 

Data security professionals as well as IT staff who wish to increase their understanding of security issues.

 

Course Outline:

                                                                                                                                                                                     

IT Systems Security

  • Role of the Systems Security Manager in 2003

- Working with the Security Manager

- Working with Departmental Managers

- Investigations

  • Job description
  • International law and corporate liability
  • Privacy laws
  • 1995 UK Act
  • US Patriot Act
  • ISO 17799

 

Computer Crime

  • Growing crimes of fraud, extortion and espionage
  • Internet crime
  • Employee crime

 

Information security

  • Why information security is needed
  • How to establish security requirements
  • Information security starting points
  • Critical success factors

 

How to implement a security program

  • Designing an information security policy

- Developing a strategy

- Strategy framework

- Strategy bed rocks

  • Taking the lead and gaining management and organizational support
  • Selecting an effective risk management methodology

 

Change and the organization

§Managing change

  • Culture
  • The project manager and change
  • Launching a project
  • End user education
  • After commissioning
  • Projects that fail

 

Requirements of ISO 17799

  • Security standards for databases
  • Security standards for personnel
  • Security standards for encryption
  • Communication standards

 

Environmental Security and Working with the Security Manager

  • Physical security, what it is and who is responsible
  • Security of file servers, firewalls, routers and Webs
  • Secure perimeters
  • Responsible persons

 

Investigations

  • Role of security on the CIRT
  • Investigating principles
  • Investigative techniques for Windows and UNIX
  • Investigating Web sites

 

Working with Departmental Managers to meet ISO17799

  • The legal department and investigations

- Outsourcing

- Investigations

- Surveillance

- AUP

- Anton Pillar Orders

  • Line Managers, Continuity and Disaster Recovery Plans

                   - Line managers and the test

  • ISO17799 and legal requirements
  • Getting agreement on security objectives
  • Managing time
  • The power of collaboration
  • Persuasion as a tool

 

Conducting a Security Audit

  • How an audit is conducted
  • Linking with internal audit on:

                   - Accounts to be examined

                   - Procedures to be tested

                   - Transactions to be analyzed

                   - Policies to be reviewed

  • The use of structured questionnaires
  • Developing work sheets and writing reports
  • Writing the Security Manual

 

Management basics

  • The perceived system security manager’s job
  • Analysis of leadership styles
  • The relationship between management and leading
  • The proactive system security manager
  • Goals and goal setting
  • Building vision in the IT and user departments

 

The importance of listening, reading and remembering in security management

  • Essentials of the listening environment
  • Recognition devices
    • Informal recognition
    • Essentials of successful recognition programmers
  • Creative listening
    • Ten keys to effective listening
    • Verifying comprehension by feed-back
  • Reading
    • Speed reading
    • Reference, technical and study reading
    • Compartmentalizing the treading task
    • Further improvement
  • Memory and recall

            - Retention and recall

          - Special memory systems

          - Remembering names and faces

                   *Associations

                   * Features

          - Increasing memory

          - Exercises

 

Communicating effectively

  • Dress
  • Body language
  • AIDA
  • ABC
  • Mirroring
  • Establishing immediate rapport

 

Controlling meetings for results

  • Other people’s meetings and hostile chairs
  • Focusing on emerging goals and targets
  • Meetings that go wrong
  • Skills and techniques to achieve goals

 

Selling deliverables

  • Presenting at board level
  • Keeping on track
  • Objectives in presentations
  • Audiences
  • Group behavior
  • Dress rehearsals
  • Ending the meeting
  • Check lists

 

Grey areas in information security

  • E-mail security and privacy
  • Acceptable use policies
  • Employee monitoring
  • Cryptography and the international community
  • Negligence issues

 

Course Methodology:

 

A variety of methodologies will be used during the course that includes:

  • (30%) Based on Case Studies
  • (30%) Techniques 
  • (30%) Role Play
  • (10%) Concepts
  • Pre-test and Post-test
  • Variety of Learning Methods
  • Lectures
  • Case Studies and Self Questionaires
  • Group Work
  • Discussion
  • Presentation

 

Course Fees:

 

To be advice as per course location. This rate includes participant’s manual, Hands-Outs, buffet lunch, coffee/tea on arrival, morning & afternoon of each day.

 

Course Certificate:

 

International Center for Training & Development (ICTD) will award an internationally recognized certificate(s) for each delegate on completion of training.

 

Course Timings:

 

Daily Course Timings:

    08:00 - 08:20       Morning Coffee / Tea

    08:20 - 10:00       First Session

    10:00 - 10:20       Coffee / Tea / Snacks

    10:20 - 12:20       Second Session

    12:20 - 13:30       Lunch Break & Prayer Break

    13:30 - 15:00       Last Session

 

Courses By Category
2024
English Training Plan
2024
Arabic Training Plan
Approved Provider

Global Innovation Institute…

ICXI Assessment

Abu Dhabi Centre for…

EFQM

International Accreditation…

Our Clients
Chat on WhatsApp