Building Information Security Compliance Series Part 5 Introduction to Information Security Management

Instructor: Endre Bihari
Product ID: 700308
Training Level: Advanced
  • Duration: 60 Min

recorded version

1x Person - Unlimited viewing for 6 Months
(For multiple locations contact Customer Care)
Recorded Link and Ref. material will be available in My CO Section
Last Recorded Date: Jun-2007

Training CD / USB Drive

One CD/USB is for usage in one location only.
(For multiple locations contact Customer Care)
CD/USB and Ref. material will be shipped within 15 business days

Customer Care

Fax: +1-650-362-2367


Read Frequently Asked Questions

This Information Security Management training/webinar offers valuable insights to information security managers about the methods and techniques used for effectively manage information security.


Information security - although the views are changing - is still often looked at as a technical or technological, not as a management issue. Following this view it has been commented that information security is a barrier to commerce.

Another - widely promoted by the ITGI - view indicates that information security is a subset of IT. Although it is a major improvement on the "technological issue only" view, significant limitations remain inherent in this view, as information security is still considered mainly a value preserver.

Companies however recognised that information security is wider than the technology (IT) used to handle it. As the practice field is widening, the need for appropriately managing it also increases. The fact that information security management came to an age is visible also by the many new or specialised credentials offered by several institutions, such as the CISM or CISSP-ISSMP.

The range of activities and the scope of responsibilities for information security management is ever increasing. Some of the drivers for this increase are the heavy reliance on information assets; the growth of cyber crime and the products of legislative efforts to curb such crimes. Many of these legislations now hold not even security but senior management personally liable.

This webinar offers valuable insights to information security managers about the methods and techniques used for effectively manage information security.

Areas Covered in this seminar:

  • Definition and purpose of information security
  • Information security - complex, yet integral
  • Information security drivers
  • The business view point
  • A chain with the weakest link - or something else
  • Types and forms of information
  • Who needs to be involved
  • Review of cyber crime evolution
  • Why information security is important?
  • The impact of doing nothing
  • What can be done?
  • The role of the information security manager
  • The major tasks of an information security manager
  • Building an effective information security management framework
  • Measuring performance - metric development

Who Will Benefit:

This seminar will provide a solid introduction to information security programme development. Practitioners of the following fields should participate:

  • CxOs
  • IT directors
  • Infrastructure managers
  • Information security managers
  • Information security consultants and practitioners
  • Auditors

Instructor Profile:

Endre Bihari, is a widely experienced IT management and consultant professional with over 19 years experience in mature and internationally competitive companies, including Deloitte, where he held the position equivalent of Director, Information Security - a role created to support the Enterprise Risk Services group with clients who need information security governance consulting.

Endre brings Enterprise Architecture and Management experience as an end-to-end senior management consultant to the design and conduct of business projects in IT strategy, infrastructure planning, integration and operational management. He has a strong understanding of project management; strategic planning and other value add activities across different platforms. This experience is based on hands-on exposure to industry areas ranging from manufacturing through telecommunications to government across e-business, information security, network integration and more traditional business areas.

Follow us :
21 CFR Part 11 Compliance for SaaS/Cloud Applications

Refund Policy

Registrants may cancel up to two working days prior to the course start date and will receive a letter of credit to be used towards a future course up to one year from date of issuance. ComplianceOnline would process/provide refund if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange.

Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs. Substitutions can happen any time.

If you have any concern about the content of the webinar and not satisfied please contact us at below email or by call mentioning your feedback for resolution of the matter.

We respect feedback/opinions of our customers which enables us to improve our products and services. To contact us please email call +1-888-717-2436 (Toll Free).

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed