SlideShare a Scribd company logo
1 of 5
Download to read offline
1
Mark T. Edmead is a successful technology entrepreneur
with over 28 years of practical experience in computer
systems architecture, information security, and project
management.
Mark excels in managing the tight-deadlines and ever
changing tasks related to mission-critical project
schedules. He has extensive knowledge in IT security, IT
and application audits, Internal Audit, IT governance,
including Sarbanes-Oxley, FDIC/FFIEC, and GLBA
compliance auditing.
Dr. Edmead understands all aspects of information
security and protection including access controls,
cryptography, security management practices, network
and Internet security, computer security law and
investigations, and physical security.
He has trained Fortune 500 and Fortune 1000 companies
in the areas of information, system, and Internet security.
He has worked with many international firms, and has the
unique ability to explain very technical concepts in
simple-to-understand terms. Mr. Edmead is a sought after
author and lecturer for information security and
information technology topics.
Mark works as an information security and regulatory
compliance consultant. He has:
• Conducted internal IT audits in the areas of critical
infrastructure/ systems and applications,
• Assessed and tested internal controls of critical
infrastructure platform systems (Windows, UNIX, IIS, SQL,
Oracle)
• Assessed and tested internal controls of various critical
financial applications.
• Prepared risk assessments and determined risks to
critical financial data systems and infrastructure
components.
• Created test plans & processes and executed test plans.
• Conducted reviews of existing systems and
applications, ensuring appropriate security, management
and data integrity via control processes.
• Prepared written reports to all levels of management
• Participated in audit review panel sessions to address
results, conclusions and follow-up actions required.
Dr Mark T. Edmead
CISSP, CISA, COBIT, Lean IT, DevOpsB
IT Transformational
Consultant
MTE Advisors
YOUR INTERNATIONAL
COURSE FACILITATOR
Tel: +6016 3326360 Fax: +603 9205 7788 kris@360bsigroup.com
1. An extensive IT Security Architecture Questionnaire that will help you
evaluate your organization’s security position.
2. Online access to course materials, case studies and other related items of the
training seminar.
3. Take with you templates and worksheets to aid you in applying and putting
into practice what you have learned from this workshop.
4. FREE CoBIT 5.0 IT Governance Assessment Evaluation Spreadsheet
1.1. AAnn exextetensnsivivee ITIT SSecec
evaluate your organizati
EXCLUSIVE:
ArArchchititecectuturere QQueueststioionnnnaiairere tthahatt wiwillll hhelelpp yoyouu
i ’ it iti
ccururitityy
i ti
:: PRE COURSE QUESTIONNAIRE & TAKEAWAYS
“Security in IT is like locking your house or car
– it doesn't stop the bad guys, but if it's good
enough they may move on to an easier target.”
- Paul Herbka
Course Participants will:
• Master the tools & techniques for effective information & network security.
• Discover how to create a complete & sustainable IT security architecture.
• Gain knowledge on how to develop sound security policy together with your
security architecture.
• Learn how to perform smart security risk assessment within your organization.
• Learn how to perform an IT governance assessment using CoBIT 5.0.
• Gain valuable insights on implementing a proactive & robust security management
system.
• Learn how to detect & prevent information security breaches due to inadequate IT
security awareness within the organization.
BENEFITS OF ATTENDING
With the rapid growth & development of the internet, organizations are taking
advantage of the new opportunities available. Likewise, unscrupulous individuals are
also exploiting the situation to collect & steal data from companies & their customers.
Information security is therefore critical for today's modern business models.
Organizations must be prepared to take crucial steps to strengthen their IT
infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business
operations while improving its security position. Successful security architecture
combines a mix of the latest policies & practices, technology, and a robust awareness
program.
This 4 day intensive training workshop addresses the latest concerns on IT
infrastructure and security. Participants will develop key skills and core competencies
that will allow them to meet the ever-changing security demands of the 21st century.
COURSE OVERVIEW
IT
SERIES
28 FEBRUARY - 02 MARCH 2016
RADISSON BLU
DUBAI DEIRA CREEK
UNITED ARAB EMIRATES
IT INFORMATION
SECURITY
MANAGEMENT
PRINCIPLES
2
WHO SHOULD ATTEND
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Heads of Departments in Information Security
Management Information Systems, IT
Infrastructure, IT Architecture, Network
Operations, IT Operations, IT Data Center,
DataBase Management, IT Deployment
IT Business Enterprise, IT Risk Management,
IT Quality Assurance, IT Audit, Risk Management,
Internal Audit, Business Continuity Planning
WHY THIS EVENT
The aim of this interactive workshop is to provide
you with the skills critical to developing your IT
Security Architecture & Policies.
After attending this workshop, you will leave
fully armed with the knowledge needed to
design and maintain a strong & secure IT
infrastructure.
The combination of interactive presentations,
hands-on exercises and open discussion groups
along with real case studies, ensures you will
obtain maximum value from attending.
COVERAGE
IT Security Concepts & Principles
Roles & Responsibilities
Security Awareness
Layered Security approach
Security Policy Implementation
Risk & Vulnerability Assessment
Threat Identification
Penetration testing
IT Network & System Security
IT Security Architecture
Security Design & Maintenance
Security Control Frameworks
ISO 27001 Security Standard
Laws & regulationsDAY2 ESTABLISHING YOUR SECURITY POLICY
We will discusses the value of the information and what we need to do to
protect it. Effective security architecture begins with the establishment of
a security policy. Organizations should also perform a risk assessment in
order to better understand the important areas in their security
architecture.
Developing a Security Policy
- The overall“plan of attack/defense”
- Declaration of intent
- Characteristics of a good policy
- Policy examples
Objectives of Risk Management
- Benefits of performing a risk assessment
- Prioritizing vulnerabilities and threats
- Identifying the risk impact and determine acceptable risks
- Creating a risk matrix
The value of information
- Why you need to classify levels of information
- Managing data at rest and in transit
- Understanding data access controls
- The value of knowing where your data resides
Basic security threats and principles
- Vulnerabilities, threats and countermeasures
- Hacker probing and attack
- LAN, WAN, and wireless network technologies and protocols
DAY1 IT SECURITY - CONCEPTS & PRINCIPLES
We will cover the main concepts, principles, structures, and standards
used to design, monitor, and secure operating systems, equipment,
networks, applications and those controls used to enforce various levels
of confidentiality, availability, and integrity.
Laying the foundation
- The relationship between people, process and technology
- The information security triad: confidentiality, integrity and availability
- Concepts of security management
- Creating policies, standards, guidelines and procedures
- Promoting security awareness
Protecting our assets
- Where attacks come from
- Protecting from internal attacks
- Protecting from external attacks
- Threats and vulnerabilities overview
Security Architecture Basics
- Security as a design goal
- Security models
- Authentication methods
- Authorization
- Models for access control
The Objectives of Security
- The active defense approach to security
- Using the Defense in Depth concept
- Layered approach including perimeter security, network security, host
based security, and human awareness
COURSE
CONTENT
3
COURSE SCHEDULE
8.00
8.30
10.10 - 10.30
12.00 - 13.00
14.40 - 15.00
16.00
Registration & Coffee/Tea
Workshop commences
Morning coffee/tea
Lunch
Afternoon coffee/tea
End of day
“Session well organized. The trainer is very
conversant with the subject matter. Well delivered
and would definitely recommend to anyone else.”
- Habil Mutende, Manager Information Security & Change
Management, Central Bank of Kenya
“Excellent presentation, excellent attitude to
answer our questions & to share his experience.”
- Senior Manager, IT Department, Deloitte
“The programme is good for IT professionals...
[who] would like to setup ISO function or improve
ISO.”- G. Ramgopal, Head IT Security, Bank Muscat Oman
“I have used Mark in key roles with high visibility
clients. Without hesitation I would highly
recommend Mark for any and all IT audit
engagements. His professionalism, deep
knowledge, and results oriented work style are
deeply valued by not only myself, but more
importantly by the all those who are lucky enough
to use his services.”- Russ Aebig, Director at Artesient
“We have used Mark Edmead on several projects in
the past few years including SOX readiness for
publicly traded companies and IT vulnerability
assessments for major financial institutions. He
always delivers professional and detail-oriented
workpapers on-time and within budget. Mark is
highly recommended and we will continue to use
him on other projects.”- Brenda Piazza, Director at CBIZ MHM
1
3
2
4
5
Latest TESTIMONIALS
DAY4 DESIGNING & MAINTAINING YOUR
SECURITY ARCHITECTURE
Day Four wraps up the course by providing a guideline on how to design,
create, and maintain a strong security architecture. This includes a
discussion on best IT Governance practices. We will also discuss how to
make sure your technology infrastructure aligns with your security (and
business) objectives.
Implementing a proactive security management system
- Justifying the cost of security
- Aligning your technology infrastructure to business objectives
- How to continually strengthen your security posture
Understanding the various security control frameworks
- COBIT 5 – Governance and Management of IT Enterprise
- ISO 270xx Security Standards
- The NIST Standards
Developing and implementing a successful governance strategy
- The Balanced Scorecard and IT Governance
- Governance of outsourcing
- Managing risks and IT Governance
- Best practices for implementing continuous improvement concepts and
principles
Understanding Strategic Alignment
- Enterprise mission, objectives, and values
- Drivers and trigger points
- Benefits realization, risk optimization, and resource optimization
- Business objectives and goals alignment to facilitate IT governance
DAY3 THREAT, RISK & VULNERABILITY
ASSESSMENT
We will discuss the vulnerabilities, threats, and risks to the system and
network environment. We will also discuss practical application of risk
assessment to an organization, how to conduct an assessment, and how
to use this information to improve the security posture.
Vulnerability and Penetration testing
- Why performing vulnerability and penetration testing is important
- Tools and techniques used in penetration testing
- Review of sample penetration testing report
- How to correct problems identified in the vulnerability and penetration
testing report
Protecting the network
- Firewalls and other perimeter security devices
- Intrusion detection systems
- Using a scanner to discover vulnerabilities
- Understanding network management tools
Hardening Operating Systems
- Unused user accounts
- Excessive rights and permissions
- Service packs and hotfixes
The importance of the Business Continuity and Disaster Recover Plans
- Introduction to BCP/DRP
- Conducting the Business Impact Assessment (BIA)
- Review of the BCP/DRP process
- Establishing data recover options
PAYMENT DETAILSFEES
4
OTHER RELATED PUBLIC COURSES
IT Governance & Leadership
Document Management & Retention
Business Continuity and Disaster Recovery Planning
Preparing for the CISSP exam
Fraud Control & the COSO 2013 Framework
IT Risk Management
Project Management for IT Professionals
360 BSI is passionate about providing strategic IT programs
and high potential training solutions across the region to build
personal competencies and organizational capability.
You will receive practical training from a professionally
qualified educator with over twenty years of teaching and
training experience.
Please feel free to mix-and-match topics from the areas listed
below to get the right training content for your staff. Other
topics may be available upon request.
IN-HOUSE TRAINING
Thank you for your registration!
* Save up to 50% for In-house Training program
Substitutions are welcome at any time. Please notify us at
least 2 working days prior to the event. All cancellations will
carry a 10% cancellation fee, once a registration form is
received. All cancellations must be in writing by fax or email
at least 2 weeks before the event date. Cancellations with
less than 2 weeks prior to the event date carry a 100% liability.
However, course materials will still be couriered to you.
General Information:
1
2
3
4
5
Cancellations/Substitutions
Fax: +603 9205 7788
Tel: +603 9205 7772
Mobile: +6016 3326 360
Email: kris@360bsigroup.com
REGISTRATION FORM
Hotel Contact Details:
Payment is required within 5 days upon receipt of
the invoice.
All payments must be received prior to the event date
15% discount - Special for Group of 3
USD 3,395 per delegate
Bank transfer:
360 BSI MIDDLE EAST LIMITED
Abu Dhabi Commercial Bank
Dubai Mall Branch, P.O.Box 49124 Dubai, U.A.E
Account No: 10065721319001
Swift No: ADCBAEAAXXX
IBAN No: AE780030010065721319001
The fee does not include any taxes (withholding or otherwise). In case of any taxes applicable
the client has to ensure that the taxes are paid on top of the investment fee paid for the course.
Compliance with the local tax laws is the responsibility of the client.
360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL, 168 Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia.©
Name
Name on tag
Job Title
Email
Mobile
:
:
:
:
:
Name
Name on tag
Job Title
Email
Mobile
:
:
:
:
:
Name
Name on tag
Job Title
Email
Mobile
:
:
:
:
:
1
2
3
DELEGATES
AUTHORIZATION
(This form is invalid without a signature)
Name :
Job Title :
Email :
( )Tel :
Organization :
Address :
Signature : Date: / /
28 FEB - 02 MAR 2016
RADISSON BLU
DUBAI DEIRA CREEK
UNITED ARAB EMIRATES
For Room Reservation, contact for 360BSI corporate rates.
Telephone: 00971 4 2057105 Fax: 00971 4 2234698
E-mail: reservations.dxbza@radissonblu.com
Radisson BLU Hotel, Dubai Deira Creek
Baniyas Road, P.O. Box 476, Dubai, UAE
Registrations close ONE (1) week before the training dates.
The fees cover lunch, tea breaks, materials and certificate.
Official confirmation will be sent, once registration has been
received.
Participants will need to arrange their own accommodation.
Attire: Smart Casual
IT INFORMATION
SECURITY
MANAGEMENT
PRINCIPLES
360 BSI Training Calendar 2016
Contact Kris at kris@360bsi.com to register or for further details. Tel: +60 16 3326 360
Event Code Type COURSE TITLE DATE - 2016 VENUE
KK-TE-DOH-46 General Effective Technical Report Writing 13 - 14 Dec 2015 Doha
KK-TE-KL-41 General Effective Technical Report Writing 13 - 14 Jan 2016 Kuala Lumpur
KK-TE-JAK-42 General Effective Technical Report Writing 18 - 19 Jan 2016 Jakarta
KK-TE-DOH-47 General Effective Technical Report Writing 21 - 22 Feb 2016 Doha
SV-IT-KL-22 IT Business Continuity & Disaster Recovery Planning 23 - 25 Feb 2016 Kuala Lumpur
SV-IT-DUB-21 IT IT Information Security Management Principles 28 Feb - 02 Mar 2016 Dubai
KK-MN-DUB-129 IT
Document & Information Management, Security,
Retention & Archiving
06 - 09 Mar 2016 Dubai
SV-SS-DUB-102 Safety BBS: Safety & Leadership 06 - 08 Mar 2016 Dubai
SV-SS-DUB-103 Safety Root Cause Analysis 09 - 10 Mar 2016 Dubai
KK-MN-KL-117/118 General Negotiating Sales Success & Customer Loyalty 07 - 10 March 2016 Kuala Lumpur
KK-MN-KL-119/120 General
Effective Communication, Presentation Skills &
Report Writing
07 - 10 March 2016 Kuala Lumpur
KK-MN-DUB-121/122 General Negotiating Sales Success & Customer Loyalty 13 - 16 March 2016 Dubai
KK-MN-DUB-123/124 General
Effective Communication, Presentation Skills &
Report Writing
13 - 16 March 2016 Dubai
KK-MN-SIN-130 IT
Document & Information Management, Security,
Retention & Archiving
04 - 07 Apr 2016 Singapore
KK-MN-DUB-131 Management Green Supply Chain Management 10 - 12 Apr 2016 Dubai
SV-FI-KL-11/12 Finance
Fraud Control & The COSO 2013 Framework: Improving
Internal Controls and Organizational Effectiveness
To be confirmed 2016 Kuala Lumpur
SV-MN-DUB-131 HR Effective Performance Management To be confirmed 2016 Dubai
SV-MN-DUB-132 HR Preventing Workplace Bullying To be confirmed 2016 Dubai
SV-FI-DUB-9/10 Finance
Fraud Control & The COSO 2013 Framework: Improving
Internal Controls and Organizational Effectiveness
To be confirmed 2016 Dubai
SV-IT-DUB-19 IT Project Management for IT Professionals (23 PDUs) To be confirmed 2016 Dubai
SV-SS-DUB-96 Safety Visible Safety Leadership To be confirmed 2016 Dubai
SV-SS-DUB-97 Safety
Quality, Behavior & the Bottom Line: The Human Side of
Quality Improvement
To be confirmed 2016 Dubai
SV-IT-DUB-20 IT
IT Governance: Governance & Management of
Enterprise IT
To be confirmed 2016 Dubai
Technical
Advanced Shutdown / Turnaround / Outage (STO)
Management
Dubai
Security Advanced Certificate in Security Management Kuala Lumpur
Security
Advanced Certificate in Professional Investigation &
Covert Surveillance
Dubai
Security Advanced Certificate in Field Incident Command Dubai
Management CSR Strategy & Value-creation Masterclass Dubai
HR Training ROI Masterclass Dubai
Management Effective and Efficient Warehouse Operations Dubai
Finance Effective Collection & Recovery Strategies Dubai
Other Training Courses by Affiliated Training Partners

More Related Content

What's hot

IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesGreenway Health
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsOxfordCambridge
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
 
Information security management (bel g. ragad)
Information security management (bel g. ragad)Information security management (bel g. ragad)
Information security management (bel g. ragad)Rois Solihin
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policyRossMob1
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOisc2-hellenic
 
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.IGN MANTRA
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk ManagementHamed Moghaddam
 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Seungjoo Kim
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policycharlesgarrett
 
CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1Hamed Moghaddam
 
A day in the life of a CISO (and advice for people looking to come into the C...
A day in the life of a CISO (and advice for people looking to come into the C...A day in the life of a CISO (and advice for people looking to come into the C...
A day in the life of a CISO (and advice for people looking to come into the C...Dimitrios Stergiou
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
Business cases internet 30 use cases
Business cases internet 30 use casesBusiness cases internet 30 use cases
Business cases internet 30 use casesPriyanka Aash
 

What's hot (20)

IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
Information security management (bel g. ragad)
Information security management (bel g. ragad)Information security management (bel g. ragad)
Information security management (bel g. ragad)
 
12 security policies
12 security policies12 security policies
12 security policies
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISO
 
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
 
Sarwono sutikno forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...
Sarwono sutikno   forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...Sarwono sutikno   forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...
Sarwono sutikno forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
CCA study group
CCA study groupCCA study group
CCA study group
 
CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
 
A day in the life of a CISO (and advice for people looking to come into the C...
A day in the life of a CISO (and advice for people looking to come into the C...A day in the life of a CISO (and advice for people looking to come into the C...
A day in the life of a CISO (and advice for people looking to come into the C...
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
Business cases internet 30 use cases
Business cases internet 30 use casesBusiness cases internet 30 use cases
Business cases internet 30 use cases
 

Similar to IT Information Security Management Principles, 28 February - 02 March 2016 Dubai UAE

IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobPriyanka Aash
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureThe Open Group SA
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security ManagementMITSDEDistance
 
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...360 BSI
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data Naveed Ahmed
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...360 BSI
 

Similar to IT Information Security Management Principles, 28 February - 02 March 2016 Dubai UAE (20)

IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Irfan Ur Rehman
Irfan Ur RehmanIrfan Ur Rehman
Irfan Ur Rehman
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Mash f43
Mash f43Mash f43
Mash f43
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise Architecture
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security Management
 
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
Martin_Leroux_2014
Martin_Leroux_2014Martin_Leroux_2014
Martin_Leroux_2014
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
 

More from 360 BSI

Information Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big DataInformation Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big Data360 BSI
 
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAEEffective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE360 BSI
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
 
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAEEffective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE360 BSI
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
 
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...360 BSI
 
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...360 BSI
 
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAEAdvanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE360 BSI
 
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia360 BSI
 
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...360 BSI
 
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...360 BSI
 
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia360 BSI
 
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAEEffective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE360 BSI
 
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...360 BSI
 
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...360 BSI
 
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAE
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAEEffective Technical Report Writing 05 - 06 October 2016 Dubai, UAE
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAE360 BSI
 
Effective Communication, Presentation Skills & Report Writing 10-13 October 2...
Effective Communication, Presentation Skills & Report Writing 10-13 October 2...Effective Communication, Presentation Skills & Report Writing 10-13 October 2...
Effective Communication, Presentation Skills & Report Writing 10-13 October 2...360 BSI
 
Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...
Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...
Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...360 BSI
 
Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...
Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...
Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...360 BSI
 

More from 360 BSI (20)

Information Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big DataInformation Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big Data
 
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAEEffective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
 
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAEEffective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
 
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
 
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
 
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAEAdvanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
 
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
 
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
 
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
 
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
 
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAEEffective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
 
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
 
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
 
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAE
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAEEffective Technical Report Writing 05 - 06 October 2016 Dubai, UAE
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAE
 
Effective Communication, Presentation Skills & Report Writing 10-13 October 2...
Effective Communication, Presentation Skills & Report Writing 10-13 October 2...Effective Communication, Presentation Skills & Report Writing 10-13 October 2...
Effective Communication, Presentation Skills & Report Writing 10-13 October 2...
 
Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...
Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...
Negotiating Sales Success & Customer Loyalty 10-13 October 2016 Kuala Lumpur,...
 
Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...
Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...
Document Management, Security & Retention 23 - 24 May 2016 / 05 - 06 Sept 201...
 

Recently uploaded

2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 

Recently uploaded (20)

2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 

IT Information Security Management Principles, 28 February - 02 March 2016 Dubai UAE

  • 1. 1 Mark T. Edmead is a successful technology entrepreneur with over 28 years of practical experience in computer systems architecture, information security, and project management. Mark excels in managing the tight-deadlines and ever changing tasks related to mission-critical project schedules. He has extensive knowledge in IT security, IT and application audits, Internal Audit, IT governance, including Sarbanes-Oxley, FDIC/FFIEC, and GLBA compliance auditing. Dr. Edmead understands all aspects of information security and protection including access controls, cryptography, security management practices, network and Internet security, computer security law and investigations, and physical security. He has trained Fortune 500 and Fortune 1000 companies in the areas of information, system, and Internet security. He has worked with many international firms, and has the unique ability to explain very technical concepts in simple-to-understand terms. Mr. Edmead is a sought after author and lecturer for information security and information technology topics. Mark works as an information security and regulatory compliance consultant. He has: • Conducted internal IT audits in the areas of critical infrastructure/ systems and applications, • Assessed and tested internal controls of critical infrastructure platform systems (Windows, UNIX, IIS, SQL, Oracle) • Assessed and tested internal controls of various critical financial applications. • Prepared risk assessments and determined risks to critical financial data systems and infrastructure components. • Created test plans & processes and executed test plans. • Conducted reviews of existing systems and applications, ensuring appropriate security, management and data integrity via control processes. • Prepared written reports to all levels of management • Participated in audit review panel sessions to address results, conclusions and follow-up actions required. Dr Mark T. Edmead CISSP, CISA, COBIT, Lean IT, DevOpsB IT Transformational Consultant MTE Advisors YOUR INTERNATIONAL COURSE FACILITATOR Tel: +6016 3326360 Fax: +603 9205 7788 kris@360bsigroup.com 1. An extensive IT Security Architecture Questionnaire that will help you evaluate your organization’s security position. 2. Online access to course materials, case studies and other related items of the training seminar. 3. Take with you templates and worksheets to aid you in applying and putting into practice what you have learned from this workshop. 4. FREE CoBIT 5.0 IT Governance Assessment Evaluation Spreadsheet 1.1. AAnn exextetensnsivivee ITIT SSecec evaluate your organizati EXCLUSIVE: ArArchchititecectuturere QQueueststioionnnnaiairere tthahatt wiwillll hhelelpp yoyouu i ’ it iti ccururitityy i ti :: PRE COURSE QUESTIONNAIRE & TAKEAWAYS “Security in IT is like locking your house or car – it doesn't stop the bad guys, but if it's good enough they may move on to an easier target.” - Paul Herbka Course Participants will: • Master the tools & techniques for effective information & network security. • Discover how to create a complete & sustainable IT security architecture. • Gain knowledge on how to develop sound security policy together with your security architecture. • Learn how to perform smart security risk assessment within your organization. • Learn how to perform an IT governance assessment using CoBIT 5.0. • Gain valuable insights on implementing a proactive & robust security management system. • Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization. BENEFITS OF ATTENDING With the rapid growth & development of the internet, organizations are taking advantage of the new opportunities available. Likewise, unscrupulous individuals are also exploiting the situation to collect & steal data from companies & their customers. Information security is therefore critical for today's modern business models. Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats. Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program. This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century. COURSE OVERVIEW IT SERIES 28 FEBRUARY - 02 MARCH 2016 RADISSON BLU DUBAI DEIRA CREEK UNITED ARAB EMIRATES IT INFORMATION SECURITY MANAGEMENT PRINCIPLES
  • 2. 2 WHO SHOULD ATTEND Vice Presidents, Directors, General Managers Chief Information Officers Chief Security Officers Chief Information Security Officers Chief Technology Officers Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning WHY THIS EVENT The aim of this interactive workshop is to provide you with the skills critical to developing your IT Security Architecture & Policies. After attending this workshop, you will leave fully armed with the knowledge needed to design and maintain a strong & secure IT infrastructure. The combination of interactive presentations, hands-on exercises and open discussion groups along with real case studies, ensures you will obtain maximum value from attending. COVERAGE IT Security Concepts & Principles Roles & Responsibilities Security Awareness Layered Security approach Security Policy Implementation Risk & Vulnerability Assessment Threat Identification Penetration testing IT Network & System Security IT Security Architecture Security Design & Maintenance Security Control Frameworks ISO 27001 Security Standard Laws & regulationsDAY2 ESTABLISHING YOUR SECURITY POLICY We will discusses the value of the information and what we need to do to protect it. Effective security architecture begins with the establishment of a security policy. Organizations should also perform a risk assessment in order to better understand the important areas in their security architecture. Developing a Security Policy - The overall“plan of attack/defense” - Declaration of intent - Characteristics of a good policy - Policy examples Objectives of Risk Management - Benefits of performing a risk assessment - Prioritizing vulnerabilities and threats - Identifying the risk impact and determine acceptable risks - Creating a risk matrix The value of information - Why you need to classify levels of information - Managing data at rest and in transit - Understanding data access controls - The value of knowing where your data resides Basic security threats and principles - Vulnerabilities, threats and countermeasures - Hacker probing and attack - LAN, WAN, and wireless network technologies and protocols DAY1 IT SECURITY - CONCEPTS & PRINCIPLES We will cover the main concepts, principles, structures, and standards used to design, monitor, and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, availability, and integrity. Laying the foundation - The relationship between people, process and technology - The information security triad: confidentiality, integrity and availability - Concepts of security management - Creating policies, standards, guidelines and procedures - Promoting security awareness Protecting our assets - Where attacks come from - Protecting from internal attacks - Protecting from external attacks - Threats and vulnerabilities overview Security Architecture Basics - Security as a design goal - Security models - Authentication methods - Authorization - Models for access control The Objectives of Security - The active defense approach to security - Using the Defense in Depth concept - Layered approach including perimeter security, network security, host based security, and human awareness COURSE CONTENT
  • 3. 3 COURSE SCHEDULE 8.00 8.30 10.10 - 10.30 12.00 - 13.00 14.40 - 15.00 16.00 Registration & Coffee/Tea Workshop commences Morning coffee/tea Lunch Afternoon coffee/tea End of day “Session well organized. The trainer is very conversant with the subject matter. Well delivered and would definitely recommend to anyone else.” - Habil Mutende, Manager Information Security & Change Management, Central Bank of Kenya “Excellent presentation, excellent attitude to answer our questions & to share his experience.” - Senior Manager, IT Department, Deloitte “The programme is good for IT professionals... [who] would like to setup ISO function or improve ISO.”- G. Ramgopal, Head IT Security, Bank Muscat Oman “I have used Mark in key roles with high visibility clients. Without hesitation I would highly recommend Mark for any and all IT audit engagements. His professionalism, deep knowledge, and results oriented work style are deeply valued by not only myself, but more importantly by the all those who are lucky enough to use his services.”- Russ Aebig, Director at Artesient “We have used Mark Edmead on several projects in the past few years including SOX readiness for publicly traded companies and IT vulnerability assessments for major financial institutions. He always delivers professional and detail-oriented workpapers on-time and within budget. Mark is highly recommended and we will continue to use him on other projects.”- Brenda Piazza, Director at CBIZ MHM 1 3 2 4 5 Latest TESTIMONIALS DAY4 DESIGNING & MAINTAINING YOUR SECURITY ARCHITECTURE Day Four wraps up the course by providing a guideline on how to design, create, and maintain a strong security architecture. This includes a discussion on best IT Governance practices. We will also discuss how to make sure your technology infrastructure aligns with your security (and business) objectives. Implementing a proactive security management system - Justifying the cost of security - Aligning your technology infrastructure to business objectives - How to continually strengthen your security posture Understanding the various security control frameworks - COBIT 5 – Governance and Management of IT Enterprise - ISO 270xx Security Standards - The NIST Standards Developing and implementing a successful governance strategy - The Balanced Scorecard and IT Governance - Governance of outsourcing - Managing risks and IT Governance - Best practices for implementing continuous improvement concepts and principles Understanding Strategic Alignment - Enterprise mission, objectives, and values - Drivers and trigger points - Benefits realization, risk optimization, and resource optimization - Business objectives and goals alignment to facilitate IT governance DAY3 THREAT, RISK & VULNERABILITY ASSESSMENT We will discuss the vulnerabilities, threats, and risks to the system and network environment. We will also discuss practical application of risk assessment to an organization, how to conduct an assessment, and how to use this information to improve the security posture. Vulnerability and Penetration testing - Why performing vulnerability and penetration testing is important - Tools and techniques used in penetration testing - Review of sample penetration testing report - How to correct problems identified in the vulnerability and penetration testing report Protecting the network - Firewalls and other perimeter security devices - Intrusion detection systems - Using a scanner to discover vulnerabilities - Understanding network management tools Hardening Operating Systems - Unused user accounts - Excessive rights and permissions - Service packs and hotfixes The importance of the Business Continuity and Disaster Recover Plans - Introduction to BCP/DRP - Conducting the Business Impact Assessment (BIA) - Review of the BCP/DRP process - Establishing data recover options
  • 4. PAYMENT DETAILSFEES 4 OTHER RELATED PUBLIC COURSES IT Governance & Leadership Document Management & Retention Business Continuity and Disaster Recovery Planning Preparing for the CISSP exam Fraud Control & the COSO 2013 Framework IT Risk Management Project Management for IT Professionals 360 BSI is passionate about providing strategic IT programs and high potential training solutions across the region to build personal competencies and organizational capability. You will receive practical training from a professionally qualified educator with over twenty years of teaching and training experience. Please feel free to mix-and-match topics from the areas listed below to get the right training content for your staff. Other topics may be available upon request. IN-HOUSE TRAINING Thank you for your registration! * Save up to 50% for In-house Training program Substitutions are welcome at any time. Please notify us at least 2 working days prior to the event. All cancellations will carry a 10% cancellation fee, once a registration form is received. All cancellations must be in writing by fax or email at least 2 weeks before the event date. Cancellations with less than 2 weeks prior to the event date carry a 100% liability. However, course materials will still be couriered to you. General Information: 1 2 3 4 5 Cancellations/Substitutions Fax: +603 9205 7788 Tel: +603 9205 7772 Mobile: +6016 3326 360 Email: kris@360bsigroup.com REGISTRATION FORM Hotel Contact Details: Payment is required within 5 days upon receipt of the invoice. All payments must be received prior to the event date 15% discount - Special for Group of 3 USD 3,395 per delegate Bank transfer: 360 BSI MIDDLE EAST LIMITED Abu Dhabi Commercial Bank Dubai Mall Branch, P.O.Box 49124 Dubai, U.A.E Account No: 10065721319001 Swift No: ADCBAEAAXXX IBAN No: AE780030010065721319001 The fee does not include any taxes (withholding or otherwise). In case of any taxes applicable the client has to ensure that the taxes are paid on top of the investment fee paid for the course. Compliance with the local tax laws is the responsibility of the client. 360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL, 168 Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia.© Name Name on tag Job Title Email Mobile : : : : : Name Name on tag Job Title Email Mobile : : : : : Name Name on tag Job Title Email Mobile : : : : : 1 2 3 DELEGATES AUTHORIZATION (This form is invalid without a signature) Name : Job Title : Email : ( )Tel : Organization : Address : Signature : Date: / / 28 FEB - 02 MAR 2016 RADISSON BLU DUBAI DEIRA CREEK UNITED ARAB EMIRATES For Room Reservation, contact for 360BSI corporate rates. Telephone: 00971 4 2057105 Fax: 00971 4 2234698 E-mail: reservations.dxbza@radissonblu.com Radisson BLU Hotel, Dubai Deira Creek Baniyas Road, P.O. Box 476, Dubai, UAE Registrations close ONE (1) week before the training dates. The fees cover lunch, tea breaks, materials and certificate. Official confirmation will be sent, once registration has been received. Participants will need to arrange their own accommodation. Attire: Smart Casual IT INFORMATION SECURITY MANAGEMENT PRINCIPLES
  • 5. 360 BSI Training Calendar 2016 Contact Kris at kris@360bsi.com to register or for further details. Tel: +60 16 3326 360 Event Code Type COURSE TITLE DATE - 2016 VENUE KK-TE-DOH-46 General Effective Technical Report Writing 13 - 14 Dec 2015 Doha KK-TE-KL-41 General Effective Technical Report Writing 13 - 14 Jan 2016 Kuala Lumpur KK-TE-JAK-42 General Effective Technical Report Writing 18 - 19 Jan 2016 Jakarta KK-TE-DOH-47 General Effective Technical Report Writing 21 - 22 Feb 2016 Doha SV-IT-KL-22 IT Business Continuity & Disaster Recovery Planning 23 - 25 Feb 2016 Kuala Lumpur SV-IT-DUB-21 IT IT Information Security Management Principles 28 Feb - 02 Mar 2016 Dubai KK-MN-DUB-129 IT Document & Information Management, Security, Retention & Archiving 06 - 09 Mar 2016 Dubai SV-SS-DUB-102 Safety BBS: Safety & Leadership 06 - 08 Mar 2016 Dubai SV-SS-DUB-103 Safety Root Cause Analysis 09 - 10 Mar 2016 Dubai KK-MN-KL-117/118 General Negotiating Sales Success & Customer Loyalty 07 - 10 March 2016 Kuala Lumpur KK-MN-KL-119/120 General Effective Communication, Presentation Skills & Report Writing 07 - 10 March 2016 Kuala Lumpur KK-MN-DUB-121/122 General Negotiating Sales Success & Customer Loyalty 13 - 16 March 2016 Dubai KK-MN-DUB-123/124 General Effective Communication, Presentation Skills & Report Writing 13 - 16 March 2016 Dubai KK-MN-SIN-130 IT Document & Information Management, Security, Retention & Archiving 04 - 07 Apr 2016 Singapore KK-MN-DUB-131 Management Green Supply Chain Management 10 - 12 Apr 2016 Dubai SV-FI-KL-11/12 Finance Fraud Control & The COSO 2013 Framework: Improving Internal Controls and Organizational Effectiveness To be confirmed 2016 Kuala Lumpur SV-MN-DUB-131 HR Effective Performance Management To be confirmed 2016 Dubai SV-MN-DUB-132 HR Preventing Workplace Bullying To be confirmed 2016 Dubai SV-FI-DUB-9/10 Finance Fraud Control & The COSO 2013 Framework: Improving Internal Controls and Organizational Effectiveness To be confirmed 2016 Dubai SV-IT-DUB-19 IT Project Management for IT Professionals (23 PDUs) To be confirmed 2016 Dubai SV-SS-DUB-96 Safety Visible Safety Leadership To be confirmed 2016 Dubai SV-SS-DUB-97 Safety Quality, Behavior & the Bottom Line: The Human Side of Quality Improvement To be confirmed 2016 Dubai SV-IT-DUB-20 IT IT Governance: Governance & Management of Enterprise IT To be confirmed 2016 Dubai Technical Advanced Shutdown / Turnaround / Outage (STO) Management Dubai Security Advanced Certificate in Security Management Kuala Lumpur Security Advanced Certificate in Professional Investigation & Covert Surveillance Dubai Security Advanced Certificate in Field Incident Command Dubai Management CSR Strategy & Value-creation Masterclass Dubai HR Training ROI Masterclass Dubai Management Effective and Efficient Warehouse Operations Dubai Finance Effective Collection & Recovery Strategies Dubai Other Training Courses by Affiliated Training Partners