Best Practices in Information Security Management

Instructor: Endre Bihari
Product ID: 700161
Training Level: Basic
  • Duration: 60 Min

recorded version

1x Person - Unlimited viewing for 6 Months
(For multiple locations contact Customer Care)
Recorded Link and Ref. material will be available in My CO Section

Training CD

One CD is for usage in one location only.
(For multiple locations contact Customer Care)
CD and Ref. material will be shipped within 15 business days

Customer Care

Fax: +1-650-963-2556


Read Frequently Asked Questions

This IT compliance training will provide a solid introduction to information security program development.


This includes both the information and the systems used to access and use the information.

Senior managers of a company are expected to demonstrate due care and due diligence in managing information assets. The security of information means that the confidentiality, integrity, availability and privacy of information assets is maintained. Efforts of maintaining information security is measured by the legislative landscape and the applied security practices.

This raises the fundamental question of what are the best applied information security practices recommended by the professional information security community. Managers however ask a lot more questions. Should we use the industry best practice? How do we know these are the best practices? How do we know we are more secure by using these practices? Do we get value for money?

Interest of managers quickly turns to more fundamental questions.
Does information security have business value?
Do we need spending money on it?
Will we have an improvement if we spend money on it?
How do we direct and control it?
Who needs to be involved?

This seminar follows through the story of a CIO who faced the elusive task of improving the security posture of the organization. A series of the questions the CIO asked are answered and solutions that are cost effective to implement are offered. Participants can gain valuable insights into knots and bolts of information security posture development work.

Areas Covered in this seminar:

  • How do I know whether we are safe or not?
  • What do I need to improve information security?
  • How do I direct and control information security?
  • How do I prepare our security work?
  • How do I implement our security work?
  • What are the steps to improve our security posture? Best Practice Considerations DOS and DON’Ts

Who Will Benefit:

This seminar will provide a solid introduction to information security programme development. Practitioners of the following fields should participate:

  • CxOs
  • IT directors
  • Infrastructure managers
  • Information security managers
  • Information security consultants and practitioners
  • Auditors

Instructor Profile:

Endre is a widely experienced IT management and consultant professional with over 19 years experience in mature and internationally competitive companies, including Deloitte, where he held the position equivalent of Director, Information Security - a role created to support the Enterprise Risk Services group with clients who need information security governance consulting.

Endre brings Enterprise Architecture and Management experience as an end-to-end senior management consultant to the design and conduct of business projects in IT strategy, infrastructure planning, integration and operational management. He has a strong understanding of project management; strategic planning and other value add activities across different platforms. This experience is based on hands-on exposure to industry areas ranging from manufacturing through telecommunications to government across e-business, information security, network integration and more traditional business areas.

Endre’s expertise has been recognized and utilized widely, including by the IT Governance Institute, where he served on the Subject Matter Expert panel to review the revision work of prominent titles including "Information Security Governance: Guidance for Boards of Directors and Executive Management". Among his achievements, Endre has developed information security architecture frameworks and information security governance frameworks for public and private sector clients, including a major Australian Government agency.

Following the completion of his MBA, Endre is currently undertaking doctoral research (DBA - Doctor of Business Administration) focusing on how corporate governance should handle technology, especially information security. With his professional and academic experience Endre remains on the leading edge of information security governance and brings to the table an incisive understanding of business drivers of compliance issues, as well as the ability to leverage technology and business imperatives to achieve for his clients competitive advantage. Endre is also a member of the Australian Institute of Company Directors.

[*Refund Policy: No refund is offered for web-based events] [Computer System Requirements to View The Web Seminar/Test Your Computer]
Follow us :
ComplianceOnline Banking Summit 2016 | Risk Management and Data Security - 80390SEM
21 CFR Part 11 Compliance for SaaS/Cloud Applications - 80202SEM

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed