Mark T. Edmead is an experienced IT security and compliance consultant with over 28 years of experience in computer systems architecture, information security, project management, and regulatory compliance. He has extensive knowledge and training in areas such as IT security, auditing, governance practices, and compliance standards. Edmead provides consulting services to organizations, which include conducting internal audits and assessments of critical infrastructure, systems, applications, and controls. He also prepares risk assessments, test plans, and reports and makes recommendations to management. Edmead helps companies implement robust security practices and ensures appropriate security, management, and data integrity.
IT Information Security Management Principles, 28 February - 02 March 2016 Dubai UAE
1. 1
Mark T. Edmead is a successful technology entrepreneur
with over 28 years of practical experience in computer
systems architecture, information security, and project
management.
Mark excels in managing the tight-deadlines and ever
changing tasks related to mission-critical project
schedules. He has extensive knowledge in IT security, IT
and application audits, Internal Audit, IT governance,
including Sarbanes-Oxley, FDIC/FFIEC, and GLBA
compliance auditing.
Dr. Edmead understands all aspects of information
security and protection including access controls,
cryptography, security management practices, network
and Internet security, computer security law and
investigations, and physical security.
He has trained Fortune 500 and Fortune 1000 companies
in the areas of information, system, and Internet security.
He has worked with many international firms, and has the
unique ability to explain very technical concepts in
simple-to-understand terms. Mr. Edmead is a sought after
author and lecturer for information security and
information technology topics.
Mark works as an information security and regulatory
compliance consultant. He has:
• Conducted internal IT audits in the areas of critical
infrastructure/ systems and applications,
• Assessed and tested internal controls of critical
infrastructure platform systems (Windows, UNIX, IIS, SQL,
Oracle)
• Assessed and tested internal controls of various critical
financial applications.
• Prepared risk assessments and determined risks to
critical financial data systems and infrastructure
components.
• Created test plans & processes and executed test plans.
• Conducted reviews of existing systems and
applications, ensuring appropriate security, management
and data integrity via control processes.
• Prepared written reports to all levels of management
• Participated in audit review panel sessions to address
results, conclusions and follow-up actions required.
Dr Mark T. Edmead
CISSP, CISA, COBIT, Lean IT, DevOpsB
IT Transformational
Consultant
MTE Advisors
YOUR INTERNATIONAL
COURSE FACILITATOR
Tel: +6016 3326360 Fax: +603 9205 7788 kris@360bsigroup.com
1. An extensive IT Security Architecture Questionnaire that will help you
evaluate your organization’s security position.
2. Online access to course materials, case studies and other related items of the
training seminar.
3. Take with you templates and worksheets to aid you in applying and putting
into practice what you have learned from this workshop.
4. FREE CoBIT 5.0 IT Governance Assessment Evaluation Spreadsheet
1.1. AAnn exextetensnsivivee ITIT SSecec
evaluate your organizati
EXCLUSIVE:
ArArchchititecectuturere QQueueststioionnnnaiairere tthahatt wiwillll hhelelpp yoyouu
i ’ it iti
ccururitityy
i ti
:: PRE COURSE QUESTIONNAIRE & TAKEAWAYS
“Security in IT is like locking your house or car
– it doesn't stop the bad guys, but if it's good
enough they may move on to an easier target.”
- Paul Herbka
Course Participants will:
• Master the tools & techniques for effective information & network security.
• Discover how to create a complete & sustainable IT security architecture.
• Gain knowledge on how to develop sound security policy together with your
security architecture.
• Learn how to perform smart security risk assessment within your organization.
• Learn how to perform an IT governance assessment using CoBIT 5.0.
• Gain valuable insights on implementing a proactive & robust security management
system.
• Learn how to detect & prevent information security breaches due to inadequate IT
security awareness within the organization.
BENEFITS OF ATTENDING
With the rapid growth & development of the internet, organizations are taking
advantage of the new opportunities available. Likewise, unscrupulous individuals are
also exploiting the situation to collect & steal data from companies & their customers.
Information security is therefore critical for today's modern business models.
Organizations must be prepared to take crucial steps to strengthen their IT
infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business
operations while improving its security position. Successful security architecture
combines a mix of the latest policies & practices, technology, and a robust awareness
program.
This 4 day intensive training workshop addresses the latest concerns on IT
infrastructure and security. Participants will develop key skills and core competencies
that will allow them to meet the ever-changing security demands of the 21st century.
COURSE OVERVIEW
IT
SERIES
28 FEBRUARY - 02 MARCH 2016
RADISSON BLU
DUBAI DEIRA CREEK
UNITED ARAB EMIRATES
IT INFORMATION
SECURITY
MANAGEMENT
PRINCIPLES
2. 2
WHO SHOULD ATTEND
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Heads of Departments in Information Security
Management Information Systems, IT
Infrastructure, IT Architecture, Network
Operations, IT Operations, IT Data Center,
DataBase Management, IT Deployment
IT Business Enterprise, IT Risk Management,
IT Quality Assurance, IT Audit, Risk Management,
Internal Audit, Business Continuity Planning
WHY THIS EVENT
The aim of this interactive workshop is to provide
you with the skills critical to developing your IT
Security Architecture & Policies.
After attending this workshop, you will leave
fully armed with the knowledge needed to
design and maintain a strong & secure IT
infrastructure.
The combination of interactive presentations,
hands-on exercises and open discussion groups
along with real case studies, ensures you will
obtain maximum value from attending.
COVERAGE
IT Security Concepts & Principles
Roles & Responsibilities
Security Awareness
Layered Security approach
Security Policy Implementation
Risk & Vulnerability Assessment
Threat Identification
Penetration testing
IT Network & System Security
IT Security Architecture
Security Design & Maintenance
Security Control Frameworks
ISO 27001 Security Standard
Laws & regulationsDAY2 ESTABLISHING YOUR SECURITY POLICY
We will discusses the value of the information and what we need to do to
protect it. Effective security architecture begins with the establishment of
a security policy. Organizations should also perform a risk assessment in
order to better understand the important areas in their security
architecture.
Developing a Security Policy
- The overall“plan of attack/defense”
- Declaration of intent
- Characteristics of a good policy
- Policy examples
Objectives of Risk Management
- Benefits of performing a risk assessment
- Prioritizing vulnerabilities and threats
- Identifying the risk impact and determine acceptable risks
- Creating a risk matrix
The value of information
- Why you need to classify levels of information
- Managing data at rest and in transit
- Understanding data access controls
- The value of knowing where your data resides
Basic security threats and principles
- Vulnerabilities, threats and countermeasures
- Hacker probing and attack
- LAN, WAN, and wireless network technologies and protocols
DAY1 IT SECURITY - CONCEPTS & PRINCIPLES
We will cover the main concepts, principles, structures, and standards
used to design, monitor, and secure operating systems, equipment,
networks, applications and those controls used to enforce various levels
of confidentiality, availability, and integrity.
Laying the foundation
- The relationship between people, process and technology
- The information security triad: confidentiality, integrity and availability
- Concepts of security management
- Creating policies, standards, guidelines and procedures
- Promoting security awareness
Protecting our assets
- Where attacks come from
- Protecting from internal attacks
- Protecting from external attacks
- Threats and vulnerabilities overview
Security Architecture Basics
- Security as a design goal
- Security models
- Authentication methods
- Authorization
- Models for access control
The Objectives of Security
- The active defense approach to security
- Using the Defense in Depth concept
- Layered approach including perimeter security, network security, host
based security, and human awareness
COURSE
CONTENT
3. 3
COURSE SCHEDULE
8.00
8.30
10.10 - 10.30
12.00 - 13.00
14.40 - 15.00
16.00
Registration & Coffee/Tea
Workshop commences
Morning coffee/tea
Lunch
Afternoon coffee/tea
End of day
“Session well organized. The trainer is very
conversant with the subject matter. Well delivered
and would definitely recommend to anyone else.”
- Habil Mutende, Manager Information Security & Change
Management, Central Bank of Kenya
“Excellent presentation, excellent attitude to
answer our questions & to share his experience.”
- Senior Manager, IT Department, Deloitte
“The programme is good for IT professionals...
[who] would like to setup ISO function or improve
ISO.”- G. Ramgopal, Head IT Security, Bank Muscat Oman
“I have used Mark in key roles with high visibility
clients. Without hesitation I would highly
recommend Mark for any and all IT audit
engagements. His professionalism, deep
knowledge, and results oriented work style are
deeply valued by not only myself, but more
importantly by the all those who are lucky enough
to use his services.”- Russ Aebig, Director at Artesient
“We have used Mark Edmead on several projects in
the past few years including SOX readiness for
publicly traded companies and IT vulnerability
assessments for major financial institutions. He
always delivers professional and detail-oriented
workpapers on-time and within budget. Mark is
highly recommended and we will continue to use
him on other projects.”- Brenda Piazza, Director at CBIZ MHM
1
3
2
4
5
Latest TESTIMONIALS
DAY4 DESIGNING & MAINTAINING YOUR
SECURITY ARCHITECTURE
Day Four wraps up the course by providing a guideline on how to design,
create, and maintain a strong security architecture. This includes a
discussion on best IT Governance practices. We will also discuss how to
make sure your technology infrastructure aligns with your security (and
business) objectives.
Implementing a proactive security management system
- Justifying the cost of security
- Aligning your technology infrastructure to business objectives
- How to continually strengthen your security posture
Understanding the various security control frameworks
- COBIT 5 – Governance and Management of IT Enterprise
- ISO 270xx Security Standards
- The NIST Standards
Developing and implementing a successful governance strategy
- The Balanced Scorecard and IT Governance
- Governance of outsourcing
- Managing risks and IT Governance
- Best practices for implementing continuous improvement concepts and
principles
Understanding Strategic Alignment
- Enterprise mission, objectives, and values
- Drivers and trigger points
- Benefits realization, risk optimization, and resource optimization
- Business objectives and goals alignment to facilitate IT governance
DAY3 THREAT, RISK & VULNERABILITY
ASSESSMENT
We will discuss the vulnerabilities, threats, and risks to the system and
network environment. We will also discuss practical application of risk
assessment to an organization, how to conduct an assessment, and how
to use this information to improve the security posture.
Vulnerability and Penetration testing
- Why performing vulnerability and penetration testing is important
- Tools and techniques used in penetration testing
- Review of sample penetration testing report
- How to correct problems identified in the vulnerability and penetration
testing report
Protecting the network
- Firewalls and other perimeter security devices
- Intrusion detection systems
- Using a scanner to discover vulnerabilities
- Understanding network management tools
Hardening Operating Systems
- Unused user accounts
- Excessive rights and permissions
- Service packs and hotfixes
The importance of the Business Continuity and Disaster Recover Plans
- Introduction to BCP/DRP
- Conducting the Business Impact Assessment (BIA)
- Review of the BCP/DRP process
- Establishing data recover options
5. 360 BSI Training Calendar 2016
Contact Kris at kris@360bsi.com to register or for further details. Tel: +60 16 3326 360
Event Code Type COURSE TITLE DATE - 2016 VENUE
KK-TE-DOH-46 General Effective Technical Report Writing 13 - 14 Dec 2015 Doha
KK-TE-KL-41 General Effective Technical Report Writing 13 - 14 Jan 2016 Kuala Lumpur
KK-TE-JAK-42 General Effective Technical Report Writing 18 - 19 Jan 2016 Jakarta
KK-TE-DOH-47 General Effective Technical Report Writing 21 - 22 Feb 2016 Doha
SV-IT-KL-22 IT Business Continuity & Disaster Recovery Planning 23 - 25 Feb 2016 Kuala Lumpur
SV-IT-DUB-21 IT IT Information Security Management Principles 28 Feb - 02 Mar 2016 Dubai
KK-MN-DUB-129 IT
Document & Information Management, Security,
Retention & Archiving
06 - 09 Mar 2016 Dubai
SV-SS-DUB-102 Safety BBS: Safety & Leadership 06 - 08 Mar 2016 Dubai
SV-SS-DUB-103 Safety Root Cause Analysis 09 - 10 Mar 2016 Dubai
KK-MN-KL-117/118 General Negotiating Sales Success & Customer Loyalty 07 - 10 March 2016 Kuala Lumpur
KK-MN-KL-119/120 General
Effective Communication, Presentation Skills &
Report Writing
07 - 10 March 2016 Kuala Lumpur
KK-MN-DUB-121/122 General Negotiating Sales Success & Customer Loyalty 13 - 16 March 2016 Dubai
KK-MN-DUB-123/124 General
Effective Communication, Presentation Skills &
Report Writing
13 - 16 March 2016 Dubai
KK-MN-SIN-130 IT
Document & Information Management, Security,
Retention & Archiving
04 - 07 Apr 2016 Singapore
KK-MN-DUB-131 Management Green Supply Chain Management 10 - 12 Apr 2016 Dubai
SV-FI-KL-11/12 Finance
Fraud Control & The COSO 2013 Framework: Improving
Internal Controls and Organizational Effectiveness
To be confirmed 2016 Kuala Lumpur
SV-MN-DUB-131 HR Effective Performance Management To be confirmed 2016 Dubai
SV-MN-DUB-132 HR Preventing Workplace Bullying To be confirmed 2016 Dubai
SV-FI-DUB-9/10 Finance
Fraud Control & The COSO 2013 Framework: Improving
Internal Controls and Organizational Effectiveness
To be confirmed 2016 Dubai
SV-IT-DUB-19 IT Project Management for IT Professionals (23 PDUs) To be confirmed 2016 Dubai
SV-SS-DUB-96 Safety Visible Safety Leadership To be confirmed 2016 Dubai
SV-SS-DUB-97 Safety
Quality, Behavior & the Bottom Line: The Human Side of
Quality Improvement
To be confirmed 2016 Dubai
SV-IT-DUB-20 IT
IT Governance: Governance & Management of
Enterprise IT
To be confirmed 2016 Dubai
Technical
Advanced Shutdown / Turnaround / Outage (STO)
Management
Dubai
Security Advanced Certificate in Security Management Kuala Lumpur
Security
Advanced Certificate in Professional Investigation &
Covert Surveillance
Dubai
Security Advanced Certificate in Field Incident Command Dubai
Management CSR Strategy & Value-creation Masterclass Dubai
HR Training ROI Masterclass Dubai
Management Effective and Efficient Warehouse Operations Dubai
Finance Effective Collection & Recovery Strategies Dubai
Other Training Courses by Affiliated Training Partners