Building Information Security Compliance Series Part 5 Introduction to Information Security Management

Instructor: Endre Bihari
Product ID: 700308
Training Level: Advanced
  • Duration: 60 Min

recorded version

1x Person - Unlimited viewing for 6 Months
(For multiple locations contact Customer Care)
Recorded Link and Ref. material will be available in My CO Section

Training CD

One CD is for usage in one location only.
(For multiple locations contact Customer Care)
CD and Ref. material will be shipped within 15 business days

Customer Care

Fax: +1-650-565-8542


Read Frequently Asked Questions

This Information Security Management training/webinar offers valuable insights to information security managers about the methods and techniques used for effectively manage information security.


Information security - although the views are changing - is still often looked at as a technical or technological, not as a management issue. Following this view it has been commented that information security is a barrier to commerce.

Another - widely promoted by the ITGI - view indicates that information security is a subset of IT. Although it is a major improvement on the "technological issue only" view, significant limitations remain inherent in this view, as information security is still considered mainly a value preserver.

Companies however recognised that information security is wider than the technology (IT) used to handle it. As the practice field is widening, the need for appropriately managing it also increases. The fact that information security management came to an age is visible also by the many new or specialised credentials offered by several institutions, such as the CISM or CISSP-ISSMP.

The range of activities and the scope of responsibilities for information security management is ever increasing. Some of the drivers for this increase are the heavy reliance on information assets; the growth of cyber crime and the products of legislative efforts to curb such crimes. Many of these legislations now hold not even security but senior management personally liable.

This webinar offers valuable insights to information security managers about the methods and techniques used for effectively manage information security.

Areas Covered in this seminar:

  • Definition and purpose of information security
  • Information security - complex, yet integral
  • Information security drivers
  • The business view point
  • A chain with the weakest link - or something else
  • Types and forms of information
  • Who needs to be involved
  • Review of cyber crime evolution
  • Why information security is important?
  • The impact of doing nothing
  • What can be done?
  • The role of the information security manager
  • The major tasks of an information security manager
  • Building an effective information security management framework
  • Measuring performance - metric development

Who Will Benefit:

This seminar will provide a solid introduction to information security programme development. Practitioners of the following fields should participate:

  • CxOs
  • IT directors
  • Infrastructure managers
  • Information security managers
  • Information security consultants and practitioners
  • Auditors

Instructor Profile:

Endre Bihari, is a widely experienced IT management and consultant professional with over 19 years experience in mature and internationally competitive companies, including Deloitte, where he held the position equivalent of Director, Information Security - a role created to support the Enterprise Risk Services group with clients who need information security governance consulting.

Endre brings Enterprise Architecture and Management experience as an end-to-end senior management consultant to the design and conduct of business projects in IT strategy, infrastructure planning, integration and operational management. He has a strong understanding of project management; strategic planning and other value add activities across different platforms. This experience is based on hands-on exposure to industry areas ranging from manufacturing through telecommunications to government across e-business, information security, network integration and more traditional business areas.

Follow us :
ComplianceOnline Banking Summit 2016 | Risk Management and Data Security - 80390SEM
ComplianceOnline Medical Device Summit 2017

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed