This Information Security Governance training will facilitate an executive-level understanding of information security governance (ISG), protection risks, and employee compliance along with information assets protection (IAP)and managerial practices.
Why Should You Attend:
Information technology (IT) assets must be protected from external and internal activities detrimental to effective and efficient functionality. For this purpose, mechanisms exist that can be utilized to ensure hardware, software, and other resources are operated on by only those tasks that have gained proper authorization. Protection is the mechanism for controlling access of programs, processes, and users to resources defined by an information security system. This mechanism must enable specification of the controls to be imposed, together with some means of enforcement. Contextually, security protects the information stored in IT architectural items, as well as the physical resources deployed, from unauthorized access, malicious destruction or altercation, and accidental introduction of inconsistency.
"Information Security Governance: Issues and Answers" highlights a proven approach to deploying entity-centric IT security frameworks, architectures, methods, and techniques. In terms of content, this webinar converts selected standards and guidelines into practical applications using detailed examples and conceptual graphics. Through this webinar, security professionals will acquire an appreciation for the complexities associated with ensuring an adequate information security program.
Added by complianceonlinecom on April 11, 2013