SlideShare a Scribd company logo
CDFPS®
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL®
Certified by International Academy of Business and Financial Management (IABFM)
We can bespoke this program for in -house training
Building the world’s future leaders in business and finance
16 - 20 July 2018
CISSP®
www.iabfmafrica.org | www.iabfm.org | nairobioffice@iabfmafrica.org | Kenya +254 203673396
Holiday inn Hotel Sandton Johannesburg
Certified Information Systems Security Professional (CISSP) is an independent information security
certification governed by the not-for-profit International Information Systems Security Certification
Consortium, (ISC) 2.
The CISSP certification was the first credential in the field of information security, accredited by the
ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard
17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance
Technical (IAT) and Managerial (IAM) categories. CISSP certified professionals are considered
authorities on key security issues including mobile security, risk management, application development
security, cloud computing, among others.
CISSP certification is not only an objective measure of excellence, but a globally recognized standard
of achievement for security training. We provide comprehensive CISSP training for participants who
wish to gain expertise in defining the design, architecture, management and controls leading to a
secure business environment. Individuals possessing this vendor neutral credential are high in demand
by corporations all over the world who want to protect their organizations from a growing spurt of
sophisticated cyber attacks.
This globally recognized certification proves a candidate’s knowledge of the Information Security industry and
commitment to the profession. A CISSP is an information assurance professional who defines the architecture,
design, management and/or controls that assure the security of business environments. It prepares candidates
through a robust technical information security review along with critical IS management concepts and best
practices to drive an effective information security program. As your exclusive way to review and refresh your
knowledge of the domains and sub-domains of the CISSP CBK, the seminar will help you identify areas you need
to study and includes:
»» 100% up-to-date material
»» An overview of the information security field
»» Contributions from CISSPs; Authorized Instructors and subject matter experts
»» Post-Seminar Self-Assessment
Course Overview
Official CISSP Training Seminar
Certified Information
Systems Security Professional®
Certified Information
Systems Security Professional®
CISSP®
www.iabfm.org | www.iabfmafrica.org+254 2036 73396 nairobioffice@iabfmafrica.org
Building the world’s future leaders in business and finance
Benefits of the CISSP for You
»» Demonstrates a working knowledge of information security
»» Confirms commitment to profession
»» Offers a career differentiator, with enhanced credibility and marketability
»» Indicates that certified information security professionals earn a worldwide average of nearly 30%
more than their non-certified counterparts, according to the Global Information Security Workforce
Study
»» Fulfills government and organization requirements for information security certification mandates
Benefits of the CISSP for Your Employer
»» Positions candidates on a level playing field as certifications are recognized internationally
»» Provides increased credibility for your organization when working with vendors and contractors
»» Empowers employees with a universal language, circumventing ambiguity with industry-accepted
terms and practices
»» Validates commitment and years of experience gained in theindustry
»» Requires Continuing Professional Education (CPE) credits to ensure that personnel keep their skills
current
»» Satisfies certification mandate requirements for service providers or subcontractors
High-Level Certification Benefits
»» Worldwide recognition of competence
»» Managerial view of information security
»» Global overview of security challenges
»» In depth coverage of critical security topics
»» ANSI accreditation based on the ISO/IEC 17024 standard
CISSPs often hold job functions including:
»» Security Consultant
»» Security Manager
»» IT Director/Manager Security Auditor Security Architect
»» Security Analyst
»» Security Systems Engineer
»» Chief Information Security Officer Director of Security
»» Network Architect
CISSP candidates must have a minimum of five years of direct full-time security professional work
experience in two or more of the eight domains of the CISSP CBK®
, or four years of direct full-time
security professional work experience in two or more of the ten domains of the CISSP CBK with a
college degree.
Who Can Become a CISSP?
Why Become a CISSP?
CISSP®
www.iabfm.org | www.iabfmafrica.org+254 2036 73396 nairobioffice@iabfmafrica.org
Building the world’s future leaders in business and finance
*	 Understand and apply concepts of confidentiality,
integrity and availability
*	 Apply security governance principles
*	 Compliance
*	 Understand legal & regulatory issues that pertain to
information security in a global context
*	 Develop and implement documented security policy,
standards, procedures, and guidelines
*	 Understand business continuity requirements
*	 Contribute to personnel security policies
*	 Classify information and supporting assets
(e.g., sensitivity, criticality)
*	 Determine and maintain ownership (e.g.data owners,
system owners, business/mission owners)
*	 Protect Privacy
*	 Ensure appropriate retention (e.g. media, hardware,
personnel)
*	 Determine data security controls (e.g. data at rest, data
in transit)
*	 Establish handling requirements (e.g. markings, labels,
storage, destruction of sensitive information)
SECURITY & RISK MANAGEMENT1
ASSET SECURITY2
SECURITY ENGINEERING3
*	 Implement and manage an engineering lifecycle using
security design principles
*	 Understand fundamental concepts of security models
(e.g. Confidentiality, Integrity, and Multi- level Models)
*	 Select controls and countermeasures based upon
information systems security standards
*	 Understand the security capabilities of information
systems (e.g. memory protection, virtualization, trusted
platform module, interfaces, fault tolerance)
*	 Assess and mitigate the vulnerabilities of security
architectures, designs, and solution elements
*	 Assess and mitigate vulnerabilities in web-based
systems (e.g. XML, OWASP)
*	 Assess and mitigate vulnerabilities in mobile systems
*	 Assess and mitigate vulnerabilities in embedded devices
and cyber-physical systems (e.g. network-enabled
devices)
*	 Apply cryptography
*	 Apply secure principles to site and facility design
*	 Design and implement facility security
*	 Apply secure design principles to network architecture
(e.g. IP & non-IP protocols, segmentation)
*	 Securing network components
*	 Design and establish secure communication channels
*	 Prevent or mitigate network attacks (e.g. DDoS,
spoofing)
COMMUNICATION & NETWORK SECURITY4
*	 Control physical and logical access to assets
*	 Manage identification and authentication of people and
devices
*	 Integrate identity as a service (e.g. cloud identity)
*	 Integrate third-party identity services (e.g. on- premise)
*	 Implement and manage authorization mechanisms
IDENTITY & ACCESS MANAGEMENT5
*	 Design and validate assessment and test strategies
*	 Conduct security control testing
*	 Collect security process data (e.g. management and
operational controls)
*	 Analyze and report test output (e.g. automated, manual)
*	 Conduct or facilitate internal and third-party audits
SECURITY ASSESSMENT & TESTING6
*	 Understand and support investigations
*	 Understand requirements for investigation types
*	 Conduct logging and monitoring activities
*	 Secure the provisioning of resources
*	 Understand and apply foundational security operations
concepts
*	 Employ resource protection techniques
*	 Conduct incident response
*	 Operate and maintain preventative measures
*	 Implement and support patch and vulnerability
management
*	 Participate in and understand change management
processes (e.g. versioning, base lining, security impact
analysis)
*	 Implement recovery strategies
*	 Implement disaster recovery processes
*	 Test disaster recovery plan
*	 Participate in business continuity planning and exercising
*	 Implement and manage physical security
*	 Participate in personnel safety (e.g. duress, travel,
monitoring)
SECURITY OPERATIONS7
*	 Understand and apply security in the software
development lifecycle
*	 Enforce security controls in the development
environment
*	 Assess the effectiveness of software security
*	 Acceptance testing
*	 Assess software acquisition security
SOFTWARE DEVELOPMENT SECURITY8
CISSP®
www.iabfm.org | www.iabfmafrica.org+254 2036 73396 nairobioffice@iabfmafrica.org
Building the world’s future leaders in business and finance
Delegate(s) Identification Details
(Please complete form in CAPITAL Letters)
Delegate 1
Title: Ms Mrs Mr Dr
Surname: ___________________________________
Given Name:________________________________
Job Title: ___________________________________
Email: _____________________________________
Mobile: ____________________________________
Delegate 2
Title: Ms Mrs Mr Dr
Surname: ___________________________________
Given Name:________________________________
Job Title: ___________________________________
Email: _____________________________________
Mobile: ____________________________________
Delegate 3
Title: Ms Mrs Mr Dr
Surname: ___________________________________
Given Name: _______________________________
Job Title: ___________________________________
Email: _____________________________________
Mobile: ____________________________________
Delegate 4
Title: Ms Mrs Mr Dr
Surname: ___________________________________
Given Name:________________________________
Job Title: ___________________________________
Email: _____________________________________
Mobile: ____________________________________
Delegate 5
Title: Ms Mrs Mr Dr
Surname: ___________________________________
Given Name:________________________________
Job Title: ___________________________________
Email: _____________________________________
Mobile: ____________________________________
Company/ Organisation Details
Company name: _____________________________
Contact Person: ______________________________
Email: _____________________________________
Website:____________________________________
Country:____________________________________
State: ______________________________________
Address:____________________________________
___________________________________________
Terms and Conditions
Accepted applications to attend the International Academy of Business and Financial
Management Ltd (IABFM) training courses (Programs) are in every case subject to
these terms and conditions:
Payment Terms – Payment is due in full upon completion and return of the registration
form. IABFM reserves the right to admit or refuse admission to delegates who have not
shown proof of payment of fees or not agreed to sign an indemnity form.
Speakers - Views of Speakers at any Conference or Training Course – are their
own and do not necessarily reflect the views of IABFM, its employees, agents or
contractors.
Delegate Substitutions – Provided the fee has been paid in full, within the time frame
as per our terms and conditions, substitutions at no extra charge, can be made up to 10
working days, before the start of the course. (Send notification for any such changes in
writing for the attention of the Customer Services Manager at info@iabfm.org).
Delegate Cancellations – must be received by IABFM in writing and must be
addressed to the Customer Services Manager at info@iabfm.org
•	 Cancellations received 10 working days before the program start-date, entitle
the cancelling delegate to a full credit of amounts (credit to attend future event
– not refund monies) paid to date of cancellation which may only be redeemed
against the cost of any future IABFM program, within one year from date of such
cancellation;
•	 Any cancellation(s) received less than 10 working days before the program
commencement date, does not entitle the cancelling delegate to any refund or
credit note and the full fee must be paid;
•	 Non attendance without written cancellation to the Customer Services Manager is
treated as a cancellation with no entitlement to any refund or credit.
Speaker Changes – Occasionally it is necessary, for reasons beyond our control, to
alter the content and timing of the program or the identity of the speakers.
*	If the IABFM cancels a program, delegate payments at the date of cancellation will
be credited to an IABFM program (such credit is available for up to one year from
the date of cancellation). If the IABFM postpones a program, delegate payments
at the postponement date will be credited towards the rescheduled program. If the
delegate is unable to attend the rescheduled program, the delegate will receive
a full credit of amounts paid up to the date of postponement which may only be
redeemed against the cost of any future IABFM program (and such credit will be
available for one year from the date of postponement). No cash refunds whatsoever
are available for cancellations or postponements.
Program Registration Form
Method of payment
A confirm letter and invoice will be sent upon receipt of your registration.
Please note that full payment must be made upon receipt of the invoice
and prior to the event.
Only those delegates whose fees have been paid in full will be admitted to the
event. Payment can be made to following bank account:
Bank HSBC
Account Name
International Academy of Business and Financial Management
Limited
Account No. 808667422838
Branch Central Branch, Hong Kong
SWIFT Code HSBCHKHH
Or pay by Paypal
using your credit card
Indemnity – The IABFM is absolved from and indemnified against any loss or damage
as a result of substitution, alteration or cancellation/postponement of a program arising
from any cause whatsoever, including, without limitation, any fortuitous event, Act
of God, unforeseen occurrence or any other event that renders performance of the
program impracticable or impossible.
A “fortuitous event” includes, but is not limited to, war, fire, flood, riot, industrial
action, extreme weather or other emergency.
Warranty of Authority – The signatory warrants that he/she has the authority to sign
this Application and agrees to be personally liable to IABFM for payments falling due
pursuant thereto should such warranty be breached.
Authorization and Acceptance of Terms and Conditions
I hereby declare I am authorised to sign this contract terms and
Conditions conditions in the name of the company/organistion.
Company/Organisation:__________________________________
Name: _____________________Date:________________
Signature__________________________
www.iabfm.org | www.iabfmafrica.orginfo@iabfm.org | nairobioffice@iabfmafrica.org
Program Period:
Program Venue:
Program Price: US $2,950.00 per delegate *
*Above price is net amount payable to IABFM, any withholding TAX or VAT
is an addtional cost payble by the client.
Building the world’s future leaders in business and finance
Thank you for your interest in the program. To register, please
provide the following information and sign the form.
Certified Information Systems Security Professional
16 - 20 July 2018
Holiday inn Hotel Sandton Johannesburg
Print
Submit

More Related Content

What's hot

Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
Zefren Edior
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
MLG College of Learning, Inc
 
NIST CSF Overview
NIST CSF OverviewNIST CSF Overview
NIST CSF Overview
Priyanka Aash
 
Security Operations Center
Security Operations CenterSecurity Operations Center
Security Operations Center
MDS CS
 
Skill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOCSkill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOCFuad Khan
 
ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!
PECB
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
Karthikeyan Dhayalan
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
xband
 
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenario
Akingbade Akinfenwa
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
Vijilan IT Security solutions
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
Joel Aleburu
 
Esguf Profile Short V34
Esguf Profile Short V34Esguf Profile Short V34
Esguf Profile Short V34
Jorge Sebastiao
 
Lesson 3
Lesson 3Lesson 3
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPRHow an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
PECB
 
Protecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthProtecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in Depth
PECB
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
Brencil Kaimba
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
John Gilligan
 

What's hot (19)

Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
 
NIST CSF Overview
NIST CSF OverviewNIST CSF Overview
NIST CSF Overview
 
Security Operations Center
Security Operations CenterSecurity Operations Center
Security Operations Center
 
Skill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOCSkill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOC
 
Stu r35 b
Stu r35 bStu r35 b
Stu r35 b
 
ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenario
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
 
Esguf Profile Short V34
Esguf Profile Short V34Esguf Profile Short V34
Esguf Profile Short V34
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPRHow an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
 
Protecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthProtecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in Depth
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
 

Similar to Certified Information Systems Security Professional

cissp-course content.pdf & cissp description
cissp-course content.pdf & cissp descriptioncissp-course content.pdf & cissp description
cissp-course content.pdf & cissp description
Infosec train
 
CISSP _Course _Description and course overview
CISSP _Course _Description and course overviewCISSP _Course _Description and course overview
CISSP _Course _Description and course overview
priyanshamadhwal2
 
Cissp certified information systems security professional - 27 th february ...
Cissp   certified information systems security professional - 27 th february ...Cissp   certified information systems security professional - 27 th february ...
Cissp certified information systems security professional - 27 th february ...
Access Business Management Conferencing International
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
SagarNegi10
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
SagarNegi10
 
CISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security LeadersCISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security Leaders
NUS-ISS
 
File1
File1File1
Business cases internet 30 use cases
Business cases internet 30 use casesBusiness cases internet 30 use cases
Business cases internet 30 use cases
Priyanka Aash
 
Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)
Joshua Fonseca
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
Priyanka Aash
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
Shankar Subramaniyan
 
Certifications on Security - IS AUDIT
Certifications on Security - IS AUDITCertifications on Security - IS AUDIT
Certifications on Security - IS AUDIT
Shahzeb Pirzada
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
InfosecTrain
 
Cissp Training |IEVISION
Cissp Training |IEVISION Cissp Training |IEVISION
Cissp Training |IEVISION
IEVISION IT SERVICES Pvt. Ltd
 
Cissp training and certification in mumbai
Cissp training and certification in mumbaiCissp training and certification in mumbai
Cissp training and certification in mumbai
IEVISION IT SERVICES Pvt. Ltd
 
Cissp Training |IEVISION
Cissp Training |IEVISION Cissp Training |IEVISION
Cissp Training |IEVISION
IEVISION IT SERVICES Pvt. Ltd
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security Certifications
Nithin Sai
 

Similar to Certified Information Systems Security Professional (20)

cissp-course content.pdf & cissp description
cissp-course content.pdf & cissp descriptioncissp-course content.pdf & cissp description
cissp-course content.pdf & cissp description
 
CISSP _Course _Description and course overview
CISSP _Course _Description and course overviewCISSP _Course _Description and course overview
CISSP _Course _Description and course overview
 
Mash f43
Mash f43Mash f43
Mash f43
 
Cissp certified information systems security professional - 27 th february ...
Cissp   certified information systems security professional - 27 th february ...Cissp   certified information systems security professional - 27 th february ...
Cissp certified information systems security professional - 27 th february ...
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
CISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security LeadersCISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security Leaders
 
File1
File1File1
File1
 
Business cases internet 30 use cases
Business cases internet 30 use casesBusiness cases internet 30 use cases
Business cases internet 30 use cases
 
Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Certifications on Security - IS AUDIT
Certifications on Security - IS AUDITCertifications on Security - IS AUDIT
Certifications on Security - IS AUDIT
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
Cissp Training |IEVISION
Cissp Training |IEVISION Cissp Training |IEVISION
Cissp Training |IEVISION
 
Cissp training and certification in mumbai
Cissp training and certification in mumbaiCissp training and certification in mumbai
Cissp training and certification in mumbai
 
Cissp Training |IEVISION
Cissp Training |IEVISION Cissp Training |IEVISION
Cissp Training |IEVISION
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security Certifications
 

More from Helen Njuguna

Certified administration and office management professional
Certified administration and office management professionalCertified administration and office management professional
Certified administration and office management professional
Helen Njuguna
 
IT risk, security and cyber-crime prevention
IT risk, security and cyber-crime preventionIT risk, security and cyber-crime prevention
IT risk, security and cyber-crime prevention
Helen Njuguna
 
Advanced Governance Risk & Compliance Conference
Advanced Governance Risk & Compliance ConferenceAdvanced Governance Risk & Compliance Conference
Advanced Governance Risk & Compliance Conference
Helen Njuguna
 
Hrtm conference 5-2019
Hrtm conference 5-2019Hrtm conference 5-2019
Hrtm conference 5-2019
Helen Njuguna
 
INTERNATIONAL PUBLIC SECTOR ACCOUNTING STANDARDS
INTERNATIONAL PUBLIC SECTOR ACCOUNTING STANDARDSINTERNATIONAL PUBLIC SECTOR ACCOUNTING STANDARDS
INTERNATIONAL PUBLIC SECTOR ACCOUNTING STANDARDS
Helen Njuguna
 
CERTIFIED BUSINESS OPERATIONS PROFESSIONAL
CERTIFIED BUSINESS OPERATIONS PROFESSIONALCERTIFIED BUSINESS OPERATIONS PROFESSIONAL
CERTIFIED BUSINESS OPERATIONS PROFESSIONAL
Helen Njuguna
 

More from Helen Njuguna (6)

Certified administration and office management professional
Certified administration and office management professionalCertified administration and office management professional
Certified administration and office management professional
 
IT risk, security and cyber-crime prevention
IT risk, security and cyber-crime preventionIT risk, security and cyber-crime prevention
IT risk, security and cyber-crime prevention
 
Advanced Governance Risk & Compliance Conference
Advanced Governance Risk & Compliance ConferenceAdvanced Governance Risk & Compliance Conference
Advanced Governance Risk & Compliance Conference
 
Hrtm conference 5-2019
Hrtm conference 5-2019Hrtm conference 5-2019
Hrtm conference 5-2019
 
INTERNATIONAL PUBLIC SECTOR ACCOUNTING STANDARDS
INTERNATIONAL PUBLIC SECTOR ACCOUNTING STANDARDSINTERNATIONAL PUBLIC SECTOR ACCOUNTING STANDARDS
INTERNATIONAL PUBLIC SECTOR ACCOUNTING STANDARDS
 
CERTIFIED BUSINESS OPERATIONS PROFESSIONAL
CERTIFIED BUSINESS OPERATIONS PROFESSIONALCERTIFIED BUSINESS OPERATIONS PROFESSIONAL
CERTIFIED BUSINESS OPERATIONS PROFESSIONAL
 

Recently uploaded

Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
benishzehra469
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
axoqas
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
nscud
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
ewymefz
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
enxupq
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
ewymefz
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
NABLAS株式会社
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
ewymefz
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
enxupq
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 

Recently uploaded (20)

Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 

Certified Information Systems Security Professional

  • 1. CDFPS® CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL® Certified by International Academy of Business and Financial Management (IABFM) We can bespoke this program for in -house training Building the world’s future leaders in business and finance 16 - 20 July 2018 CISSP® www.iabfmafrica.org | www.iabfm.org | nairobioffice@iabfmafrica.org | Kenya +254 203673396 Holiday inn Hotel Sandton Johannesburg
  • 2. Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification Consortium, (ISC) 2. The CISSP certification was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories. CISSP certified professionals are considered authorities on key security issues including mobile security, risk management, application development security, cloud computing, among others. CISSP certification is not only an objective measure of excellence, but a globally recognized standard of achievement for security training. We provide comprehensive CISSP training for participants who wish to gain expertise in defining the design, architecture, management and controls leading to a secure business environment. Individuals possessing this vendor neutral credential are high in demand by corporations all over the world who want to protect their organizations from a growing spurt of sophisticated cyber attacks. This globally recognized certification proves a candidate’s knowledge of the Information Security industry and commitment to the profession. A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. It prepares candidates through a robust technical information security review along with critical IS management concepts and best practices to drive an effective information security program. As your exclusive way to review and refresh your knowledge of the domains and sub-domains of the CISSP CBK, the seminar will help you identify areas you need to study and includes: »» 100% up-to-date material »» An overview of the information security field »» Contributions from CISSPs; Authorized Instructors and subject matter experts »» Post-Seminar Self-Assessment Course Overview Official CISSP Training Seminar Certified Information Systems Security Professional® Certified Information Systems Security Professional® CISSP® www.iabfm.org | www.iabfmafrica.org+254 2036 73396 nairobioffice@iabfmafrica.org Building the world’s future leaders in business and finance
  • 3. Benefits of the CISSP for You »» Demonstrates a working knowledge of information security »» Confirms commitment to profession »» Offers a career differentiator, with enhanced credibility and marketability »» Indicates that certified information security professionals earn a worldwide average of nearly 30% more than their non-certified counterparts, according to the Global Information Security Workforce Study »» Fulfills government and organization requirements for information security certification mandates Benefits of the CISSP for Your Employer »» Positions candidates on a level playing field as certifications are recognized internationally »» Provides increased credibility for your organization when working with vendors and contractors »» Empowers employees with a universal language, circumventing ambiguity with industry-accepted terms and practices »» Validates commitment and years of experience gained in theindustry »» Requires Continuing Professional Education (CPE) credits to ensure that personnel keep their skills current »» Satisfies certification mandate requirements for service providers or subcontractors High-Level Certification Benefits »» Worldwide recognition of competence »» Managerial view of information security »» Global overview of security challenges »» In depth coverage of critical security topics »» ANSI accreditation based on the ISO/IEC 17024 standard CISSPs often hold job functions including: »» Security Consultant »» Security Manager »» IT Director/Manager Security Auditor Security Architect »» Security Analyst »» Security Systems Engineer »» Chief Information Security Officer Director of Security »» Network Architect CISSP candidates must have a minimum of five years of direct full-time security professional work experience in two or more of the eight domains of the CISSP CBK® , or four years of direct full-time security professional work experience in two or more of the ten domains of the CISSP CBK with a college degree. Who Can Become a CISSP? Why Become a CISSP? CISSP® www.iabfm.org | www.iabfmafrica.org+254 2036 73396 nairobioffice@iabfmafrica.org Building the world’s future leaders in business and finance
  • 4. * Understand and apply concepts of confidentiality, integrity and availability * Apply security governance principles * Compliance * Understand legal & regulatory issues that pertain to information security in a global context * Develop and implement documented security policy, standards, procedures, and guidelines * Understand business continuity requirements * Contribute to personnel security policies * Classify information and supporting assets (e.g., sensitivity, criticality) * Determine and maintain ownership (e.g.data owners, system owners, business/mission owners) * Protect Privacy * Ensure appropriate retention (e.g. media, hardware, personnel) * Determine data security controls (e.g. data at rest, data in transit) * Establish handling requirements (e.g. markings, labels, storage, destruction of sensitive information) SECURITY & RISK MANAGEMENT1 ASSET SECURITY2 SECURITY ENGINEERING3 * Implement and manage an engineering lifecycle using security design principles * Understand fundamental concepts of security models (e.g. Confidentiality, Integrity, and Multi- level Models) * Select controls and countermeasures based upon information systems security standards * Understand the security capabilities of information systems (e.g. memory protection, virtualization, trusted platform module, interfaces, fault tolerance) * Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements * Assess and mitigate vulnerabilities in web-based systems (e.g. XML, OWASP) * Assess and mitigate vulnerabilities in mobile systems * Assess and mitigate vulnerabilities in embedded devices and cyber-physical systems (e.g. network-enabled devices) * Apply cryptography * Apply secure principles to site and facility design * Design and implement facility security * Apply secure design principles to network architecture (e.g. IP & non-IP protocols, segmentation) * Securing network components * Design and establish secure communication channels * Prevent or mitigate network attacks (e.g. DDoS, spoofing) COMMUNICATION & NETWORK SECURITY4 * Control physical and logical access to assets * Manage identification and authentication of people and devices * Integrate identity as a service (e.g. cloud identity) * Integrate third-party identity services (e.g. on- premise) * Implement and manage authorization mechanisms IDENTITY & ACCESS MANAGEMENT5 * Design and validate assessment and test strategies * Conduct security control testing * Collect security process data (e.g. management and operational controls) * Analyze and report test output (e.g. automated, manual) * Conduct or facilitate internal and third-party audits SECURITY ASSESSMENT & TESTING6 * Understand and support investigations * Understand requirements for investigation types * Conduct logging and monitoring activities * Secure the provisioning of resources * Understand and apply foundational security operations concepts * Employ resource protection techniques * Conduct incident response * Operate and maintain preventative measures * Implement and support patch and vulnerability management * Participate in and understand change management processes (e.g. versioning, base lining, security impact analysis) * Implement recovery strategies * Implement disaster recovery processes * Test disaster recovery plan * Participate in business continuity planning and exercising * Implement and manage physical security * Participate in personnel safety (e.g. duress, travel, monitoring) SECURITY OPERATIONS7 * Understand and apply security in the software development lifecycle * Enforce security controls in the development environment * Assess the effectiveness of software security * Acceptance testing * Assess software acquisition security SOFTWARE DEVELOPMENT SECURITY8 CISSP® www.iabfm.org | www.iabfmafrica.org+254 2036 73396 nairobioffice@iabfmafrica.org Building the world’s future leaders in business and finance
  • 5. Delegate(s) Identification Details (Please complete form in CAPITAL Letters) Delegate 1 Title: Ms Mrs Mr Dr Surname: ___________________________________ Given Name:________________________________ Job Title: ___________________________________ Email: _____________________________________ Mobile: ____________________________________ Delegate 2 Title: Ms Mrs Mr Dr Surname: ___________________________________ Given Name:________________________________ Job Title: ___________________________________ Email: _____________________________________ Mobile: ____________________________________ Delegate 3 Title: Ms Mrs Mr Dr Surname: ___________________________________ Given Name: _______________________________ Job Title: ___________________________________ Email: _____________________________________ Mobile: ____________________________________ Delegate 4 Title: Ms Mrs Mr Dr Surname: ___________________________________ Given Name:________________________________ Job Title: ___________________________________ Email: _____________________________________ Mobile: ____________________________________ Delegate 5 Title: Ms Mrs Mr Dr Surname: ___________________________________ Given Name:________________________________ Job Title: ___________________________________ Email: _____________________________________ Mobile: ____________________________________ Company/ Organisation Details Company name: _____________________________ Contact Person: ______________________________ Email: _____________________________________ Website:____________________________________ Country:____________________________________ State: ______________________________________ Address:____________________________________ ___________________________________________ Terms and Conditions Accepted applications to attend the International Academy of Business and Financial Management Ltd (IABFM) training courses (Programs) are in every case subject to these terms and conditions: Payment Terms – Payment is due in full upon completion and return of the registration form. IABFM reserves the right to admit or refuse admission to delegates who have not shown proof of payment of fees or not agreed to sign an indemnity form. Speakers - Views of Speakers at any Conference or Training Course – are their own and do not necessarily reflect the views of IABFM, its employees, agents or contractors. Delegate Substitutions – Provided the fee has been paid in full, within the time frame as per our terms and conditions, substitutions at no extra charge, can be made up to 10 working days, before the start of the course. (Send notification for any such changes in writing for the attention of the Customer Services Manager at info@iabfm.org). Delegate Cancellations – must be received by IABFM in writing and must be addressed to the Customer Services Manager at info@iabfm.org • Cancellations received 10 working days before the program start-date, entitle the cancelling delegate to a full credit of amounts (credit to attend future event – not refund monies) paid to date of cancellation which may only be redeemed against the cost of any future IABFM program, within one year from date of such cancellation; • Any cancellation(s) received less than 10 working days before the program commencement date, does not entitle the cancelling delegate to any refund or credit note and the full fee must be paid; • Non attendance without written cancellation to the Customer Services Manager is treated as a cancellation with no entitlement to any refund or credit. Speaker Changes – Occasionally it is necessary, for reasons beyond our control, to alter the content and timing of the program or the identity of the speakers. * If the IABFM cancels a program, delegate payments at the date of cancellation will be credited to an IABFM program (such credit is available for up to one year from the date of cancellation). If the IABFM postpones a program, delegate payments at the postponement date will be credited towards the rescheduled program. If the delegate is unable to attend the rescheduled program, the delegate will receive a full credit of amounts paid up to the date of postponement which may only be redeemed against the cost of any future IABFM program (and such credit will be available for one year from the date of postponement). No cash refunds whatsoever are available for cancellations or postponements. Program Registration Form Method of payment A confirm letter and invoice will be sent upon receipt of your registration. Please note that full payment must be made upon receipt of the invoice and prior to the event. Only those delegates whose fees have been paid in full will be admitted to the event. Payment can be made to following bank account: Bank HSBC Account Name International Academy of Business and Financial Management Limited Account No. 808667422838 Branch Central Branch, Hong Kong SWIFT Code HSBCHKHH Or pay by Paypal using your credit card Indemnity – The IABFM is absolved from and indemnified against any loss or damage as a result of substitution, alteration or cancellation/postponement of a program arising from any cause whatsoever, including, without limitation, any fortuitous event, Act of God, unforeseen occurrence or any other event that renders performance of the program impracticable or impossible. A “fortuitous event” includes, but is not limited to, war, fire, flood, riot, industrial action, extreme weather or other emergency. Warranty of Authority – The signatory warrants that he/she has the authority to sign this Application and agrees to be personally liable to IABFM for payments falling due pursuant thereto should such warranty be breached. Authorization and Acceptance of Terms and Conditions I hereby declare I am authorised to sign this contract terms and Conditions conditions in the name of the company/organistion. Company/Organisation:__________________________________ Name: _____________________Date:________________ Signature__________________________ www.iabfm.org | www.iabfmafrica.orginfo@iabfm.org | nairobioffice@iabfmafrica.org Program Period: Program Venue: Program Price: US $2,950.00 per delegate * *Above price is net amount payable to IABFM, any withholding TAX or VAT is an addtional cost payble by the client. Building the world’s future leaders in business and finance Thank you for your interest in the program. To register, please provide the following information and sign the form. Certified Information Systems Security Professional 16 - 20 July 2018 Holiday inn Hotel Sandton Johannesburg Print Submit