IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 5.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Contact kris@360bsi.com to register.
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 5.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Contact kris@360bsi.com to register.
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
Master the tools & techniques for effective information & network security.
Discover how to create a complete & sustainable IT security architecture.
Gain knowledge on how to develop sound security policy together with your security architecture.
Learn how to perform an IT governance assessment using CoBIT 4.0
Learn how to perform smart security risk assessment within your organization.
Gain valuable insights on implementing a proactive & robust security management system.
Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
Saran untuk Badan Cyber Nasional (BCN)
Strategis dan Kebijakan
Kaji manfaat dan risiko cyber
Sumber daya manusia diutamakan
Kaji risiko dan manfaat perangkat teknologi, manusia, process dan organisasi
Improve Cybersecurity posture by using ISO/IEC 27032PECB
Cybersecurity is a universal concern across today’s enterprise and the need for strategic approach is required for appropriate mitigation.
Adopting ISO 27032 will help to:
• Understanding the nature of Cyberspace and Cybersecurity
• Explore Cybersecurity Ecosystem – Roles & Responsibilities
• Achieve Cyber Resilience through implementing defensive and detective cybersecurity controls
Presenter:
Obadare Peter Adewale is a first generation and visionary cyberpreneur. He is a PECB certified Trainer, Fellow Chartered Information Technology Professional, the First Licensed Penetration Tester in Nigeria, second COBIT 5 Assessor in Africa and PCI DSS QSA. He is also an alumnus of Harvard Business School and MIT Sloan School of Management Executive Education.
Link of the recorded session published on YouTube: https://youtu.be/NX5RMGOcyBM
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
IT Information Security Management Principles, 28 February - 02 March 2016 Du...360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
Cyber Security Professionals Viewed via Supply Chainaletarw
This research examines the issue of supply and demand for cybersecurity professionals to determine how to optimize the output of cybersecurity professionals through a supply chain. It was found that progress is impeded by the lack of a clearly defined and standardized definition of a cybersecurity worker and their associated knowledge, skills, and abilities. There is a known shortage of cybersecurity professionals that is affecting the ability of the United States to fulfil the mandate of President Obama who declared that the protection of our digital infrastructure is a national security priority. The problem with this declaration is that a literature review confirms there is no standard definition of a cybersecurity worker, associated skills, or educational requirements. The cybersecurity workforce to which we speak in this report consists of those who self-identify as cyber or security specialists as well as those who build and maintain the nation’s critical infrastructure. Considering the criticality of the national infrastructure, it is time for the US to take immediate steps to coordinate the development of the cybersecurity field and its associated workforce supply chain.
We live in a digital world in which our happiness, health, and even our lives can depend on the performance of technology. From medical equipment to cars, and home security systems to smartphones, computerized equipment plays a greater role in the human experience with each passing year.
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
This webinar gives an idea of what is the relation of ISO 27032 with ISO 55001, and how these two standards cover one another. Get more information on Cybersecurity as the importance is given more to the security industry nowadays.
Main points covered:
• Protection assets in Cyberspace
• Covering ISO 27032 in ISO 55001 and ISO 55001 in ISO 27032
• Sample of Cybersecurity Risks in Assets
• Highlights of the Implementation of the Cyber Security program Framework
Presenter:
This webinar was presented by PECB Partner and Trainer Mr. Claude Essomba, who is a Managing Director at GETSEC SARL, and has more than 9 years of experience in IT and Information Security.
Link of the recorded session published on YouTube: https://youtu.be/_280jG77iKY
Cyber security refers to the ability to defend against cyber-attacks, protect resources, and prevent cyber-attacks while information assurance is to ensure the confidentiality, possession or control, integrity, authenticity, availability and utility of information and information systems.
Too many incidents related to "ransomware" in North East of Itally. Companies needs to understand how to protect themselves and ensure continued access to the digital data. The damage of a cyber incidents exceed the threshold of US $ 25mil. Safe rating of Intangible Assets of a company need enhancement of the cyber risks insurance market. But a weak competence require clarification on this topic. The research intent was to identify the real risks and digital vulnerabilities in companies. We have done an evaluation of typical insurance products on IT risk and we have made a CIO/CISO Survey. The final scope was a guideline for approacing the problem of outsourcing Cyber Risk Protection.
This course covers effective strategies, techniques, systems, polices, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
In today’s world and further into the digital future, all organizations face an ever-increasing number of information-related security challenges and risks against a backdrop of increasing national and global compliance, and audit standards and legislation.
Cybersecurity is the protection of data from theft and damage, business information, people’s identities, and how all businesses can be better equipped to work more safely in an increasingly online world where sensitive and personal information is stored, shared, and communicated.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. Participants will develop key skills and core competencies that will allow them to meet the ever-changing information security demands of the 21st century.
Course Participants will:
Understand today’s and tomorrow’s cybersecurity and cybercrime threats, issues, and risks; how to set up policies, train users, create strategies, and implement systems and tools to help protect data, information and people’s identities
Manage the growing volume of confidential, sensitive business information and data to protect, keep safe, and communicate securely against a backdrop of increasing cyber threats, as well as privacy, legal, and compliance regulations
Develop strategies and ways of working to improve detection of cybersecurity threats and improve information compliance
Understand the security-related international information compliance and regulations, including industry specific standards
Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cybersecurity
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment, IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning
This course covers effective strategies, techniques, systems, polices, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
In today’s world and further into the digital future, all organizations face an ever-increasing number of information-related security challenges and risks against a backdrop of increasing national and global compliance, and audit standards and legislation.
Cybersecurity is the protection of data from theft and damage, business information, people’s identities, and how all businesses can be better equipped to work more safely in an increasingly online world where sensitive and personal information is stored, shared, and communicated.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. Participants will develop key skills and core competencies that will allow them to meet the ever-changing information security demands of the 21st century.
Course Participants will:
Understand today’s and tomorrow’s cybersecurity and cybercrime threats, issues, and risks; how to set up policies, train users, create strategies, and implement systems and tools to help protect data, information and people’s identities
Manage the growing volume of confidential, sensitive business information and data to protect, keep safe, and communicate securely against a backdrop of increasing cyber threats, as well as privacy, legal, and compliance regulations
Develop strategies and ways of working to improve detection of cybersecurity threats and improve information compliance
Understand the security-related international information compliance and regulations, including industry specific standards
Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cybersecurity
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment, IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. This course covers effective strategies, techniques, systems, policies, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
Course Participants will:
- Develop strategies and ways of working to improve detection of cyber security treats and improve information compliance
- Understand the security-related international information compliance and regulations, including industry specific standards
- Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cyber security, which will enable teams to become more effective
- Align cybersecurity, cybercrime and information compliance within the organization with related initiatives, including HR training and legal departments
- Help managers gain more confidence in cyber security awareness and understand information compliance in their industries
- Improve the overall process for secure working and reducing risk when dealing with different kinds of information such as confidential and sensitive data
Contact kris@360bsi.com to register.
Subrata Guha, UL DQS Inc. IT Services Director, with more than 20 years of professional experience in the fields of IT Service Management, Software Engineering and Audit/Assessment of Quality Management Systems hosts a webinar that focuses on the transition to ISO IEC 27001:2013. This webinar includes:
- Highlights of the changes in ISO IEC 27001:2013
- Transition Strategy
- Q&A session
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
Master the tools & techniques for effective information & network security.
Discover how to create a complete & sustainable IT security architecture.
Gain knowledge on how to develop sound security policy together with your security architecture.
Learn how to perform an IT governance assessment using CoBIT 4.0
Learn how to perform smart security risk assessment within your organization.
Gain valuable insights on implementing a proactive & robust security management system.
Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
Saran untuk Badan Cyber Nasional (BCN)
Strategis dan Kebijakan
Kaji manfaat dan risiko cyber
Sumber daya manusia diutamakan
Kaji risiko dan manfaat perangkat teknologi, manusia, process dan organisasi
Improve Cybersecurity posture by using ISO/IEC 27032PECB
Cybersecurity is a universal concern across today’s enterprise and the need for strategic approach is required for appropriate mitigation.
Adopting ISO 27032 will help to:
• Understanding the nature of Cyberspace and Cybersecurity
• Explore Cybersecurity Ecosystem – Roles & Responsibilities
• Achieve Cyber Resilience through implementing defensive and detective cybersecurity controls
Presenter:
Obadare Peter Adewale is a first generation and visionary cyberpreneur. He is a PECB certified Trainer, Fellow Chartered Information Technology Professional, the First Licensed Penetration Tester in Nigeria, second COBIT 5 Assessor in Africa and PCI DSS QSA. He is also an alumnus of Harvard Business School and MIT Sloan School of Management Executive Education.
Link of the recorded session published on YouTube: https://youtu.be/NX5RMGOcyBM
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
IT Information Security Management Principles, 28 February - 02 March 2016 Du...360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
Cyber Security Professionals Viewed via Supply Chainaletarw
This research examines the issue of supply and demand for cybersecurity professionals to determine how to optimize the output of cybersecurity professionals through a supply chain. It was found that progress is impeded by the lack of a clearly defined and standardized definition of a cybersecurity worker and their associated knowledge, skills, and abilities. There is a known shortage of cybersecurity professionals that is affecting the ability of the United States to fulfil the mandate of President Obama who declared that the protection of our digital infrastructure is a national security priority. The problem with this declaration is that a literature review confirms there is no standard definition of a cybersecurity worker, associated skills, or educational requirements. The cybersecurity workforce to which we speak in this report consists of those who self-identify as cyber or security specialists as well as those who build and maintain the nation’s critical infrastructure. Considering the criticality of the national infrastructure, it is time for the US to take immediate steps to coordinate the development of the cybersecurity field and its associated workforce supply chain.
We live in a digital world in which our happiness, health, and even our lives can depend on the performance of technology. From medical equipment to cars, and home security systems to smartphones, computerized equipment plays a greater role in the human experience with each passing year.
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
This webinar gives an idea of what is the relation of ISO 27032 with ISO 55001, and how these two standards cover one another. Get more information on Cybersecurity as the importance is given more to the security industry nowadays.
Main points covered:
• Protection assets in Cyberspace
• Covering ISO 27032 in ISO 55001 and ISO 55001 in ISO 27032
• Sample of Cybersecurity Risks in Assets
• Highlights of the Implementation of the Cyber Security program Framework
Presenter:
This webinar was presented by PECB Partner and Trainer Mr. Claude Essomba, who is a Managing Director at GETSEC SARL, and has more than 9 years of experience in IT and Information Security.
Link of the recorded session published on YouTube: https://youtu.be/_280jG77iKY
Cyber security refers to the ability to defend against cyber-attacks, protect resources, and prevent cyber-attacks while information assurance is to ensure the confidentiality, possession or control, integrity, authenticity, availability and utility of information and information systems.
Too many incidents related to "ransomware" in North East of Itally. Companies needs to understand how to protect themselves and ensure continued access to the digital data. The damage of a cyber incidents exceed the threshold of US $ 25mil. Safe rating of Intangible Assets of a company need enhancement of the cyber risks insurance market. But a weak competence require clarification on this topic. The research intent was to identify the real risks and digital vulnerabilities in companies. We have done an evaluation of typical insurance products on IT risk and we have made a CIO/CISO Survey. The final scope was a guideline for approacing the problem of outsourcing Cyber Risk Protection.
This course covers effective strategies, techniques, systems, polices, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
In today’s world and further into the digital future, all organizations face an ever-increasing number of information-related security challenges and risks against a backdrop of increasing national and global compliance, and audit standards and legislation.
Cybersecurity is the protection of data from theft and damage, business information, people’s identities, and how all businesses can be better equipped to work more safely in an increasingly online world where sensitive and personal information is stored, shared, and communicated.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. Participants will develop key skills and core competencies that will allow them to meet the ever-changing information security demands of the 21st century.
Course Participants will:
Understand today’s and tomorrow’s cybersecurity and cybercrime threats, issues, and risks; how to set up policies, train users, create strategies, and implement systems and tools to help protect data, information and people’s identities
Manage the growing volume of confidential, sensitive business information and data to protect, keep safe, and communicate securely against a backdrop of increasing cyber threats, as well as privacy, legal, and compliance regulations
Develop strategies and ways of working to improve detection of cybersecurity threats and improve information compliance
Understand the security-related international information compliance and regulations, including industry specific standards
Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cybersecurity
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment, IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning
This course covers effective strategies, techniques, systems, polices, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
In today’s world and further into the digital future, all organizations face an ever-increasing number of information-related security challenges and risks against a backdrop of increasing national and global compliance, and audit standards and legislation.
Cybersecurity is the protection of data from theft and damage, business information, people’s identities, and how all businesses can be better equipped to work more safely in an increasingly online world where sensitive and personal information is stored, shared, and communicated.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. Participants will develop key skills and core competencies that will allow them to meet the ever-changing information security demands of the 21st century.
Course Participants will:
Understand today’s and tomorrow’s cybersecurity and cybercrime threats, issues, and risks; how to set up policies, train users, create strategies, and implement systems and tools to help protect data, information and people’s identities
Manage the growing volume of confidential, sensitive business information and data to protect, keep safe, and communicate securely against a backdrop of increasing cyber threats, as well as privacy, legal, and compliance regulations
Develop strategies and ways of working to improve detection of cybersecurity threats and improve information compliance
Understand the security-related international information compliance and regulations, including industry specific standards
Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cybersecurity
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment, IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. This course covers effective strategies, techniques, systems, policies, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
Course Participants will:
- Develop strategies and ways of working to improve detection of cyber security treats and improve information compliance
- Understand the security-related international information compliance and regulations, including industry specific standards
- Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cyber security, which will enable teams to become more effective
- Align cybersecurity, cybercrime and information compliance within the organization with related initiatives, including HR training and legal departments
- Help managers gain more confidence in cyber security awareness and understand information compliance in their industries
- Improve the overall process for secure working and reducing risk when dealing with different kinds of information such as confidential and sensitive data
Contact kris@360bsi.com to register.
Subrata Guha, UL DQS Inc. IT Services Director, with more than 20 years of professional experience in the fields of IT Service Management, Software Engineering and Audit/Assessment of Quality Management Systems hosts a webinar that focuses on the transition to ISO IEC 27001:2013. This webinar includes:
- Highlights of the changes in ISO IEC 27001:2013
- Transition Strategy
- Q&A session
Here are the ISO 27001:2013 documentation, implementation and audit requirements.
This document specified documentation, implementation and audit requirements for only ISO 27001, but not 114 controls specified in Annex A.
I request IS practitioners to comment and suggest improvements.
In this article I will provide an Overview of A new Information Security Management System
Standard ISO/IEC 27001:2013 , The new standard just Published from a few Days Earlier .
ISO/IEC 27001:2013 Provides requirements for Establishing, Implementing, Maintaining
and Continually Improving an Information Security Management System.
ISO/IEC 27001:2013 gives Organization a Perfect Information Security management framework for implementing
and maintaining security.
In this Article, I tried to shed some light on new standard and its Mandatory Requirements, Optional Requirements ,
Structure , Benefits , Certification Process and Estimated time for Implementation and Certification.
Informasi sebagai darah nadi organisasi (perusahaan maupun unit pemerintahan) belum sepenuhnya
ditata-kelola dengan baik seperti uang. Risiko pencapaian tujuan unit (K/L) pemerintah belum dikelola
dengan baik, demikian pula benefit realisation plan, optimasi risiko serta optimisasi sumber daya.
Peraturan perundangan belum dipahami sebagai control (kendali) terhadap risiko pencapaian tujuan
organisasi ataupun risiko pencapaian tujuan negara Indonesia. PP60/2008 Sistem Pengendalian Intern
Pemerintah belum berjalan selayaknya konsep kerangka pengendalian internal COSO. Konsep three lines
of defence juga belum diterapkan sebagai praktek COSO yang baik.
Saiful Hidayat Pemanfaatan Certification authority (CA) Untuk Transaksi Elekt...Saiful Hidayat
Pada tanggal 28-29 Nopember 2009 saya adalah satu-satunya orang yang bukan Ahli Hukum namun diminta menjadi salah satu pembicara dalam Diskusi Ahli Hukum : Peluang & Tantangan Cybernotary di Indonesia, Grand Aquilla, Bandung, yang diselenggarakan oleh Staf Ahli Bidang Hukum DEPKOMINFO
This webinar will cover the key differences between ISO/IEC 27001:2005 and the recently published
ISO/IEC 27001:2013 version of the Standard.
The focus will be on the core activities that will be required to transition an existing ISMS to the new version and discuss some of the areas likely to provide the most challenges to successful transition. Additionally, some strategies will be proposed to assist in developing the organisation's transition strategy.
Presented by Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM in Panel Uji Publik RPM Tata Kelola Keamanan Informasi Indonesia Information Security Forum, 10 Oktober 2012
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
As we approach the new year, the importance of a robust cybersecurity strategy cannot be overstated. Learning on the effective measures to be taken and tools needed to navigate the evolving cybersecurity landscape successfully is essential.
Amongst others, the webinar covers:
• ISO/IEC 27001 and ISO/IEC 27035 and their key components
• Key Components of a Resilient Cybersecurity Strategy
• Best practices for building a resilient cybersecurity strategy in 2024
Presenters:
Rinske Geerlings
Rinske is an internationally known consultant, speaker and certified Business Continuity, Information Security & Risk Management trainer.
She was awarded Alumnus of the Year 2012 of Delft University, Australian Business Woman of the Year 2010-13 by BPW, Risk Consultant of the Year 2017 (RMIA/Australasia) and Outstanding Security Consultant 2019 Finalist (OSPAs)
Rinske has consulted to the Department of Prime Minister & Cabinet, 15 Central Banks, APEC, BBC, Shell, Fuji Xerox, NIB Health Funds, ASIC, Departments of Defense, Immigration, Health, Industry, Education, Foreign Affairs and 100s of other public and private organizations across 5 continents.
She has been changing the way organizations ‘plan for the unexpected’. Her facilitation skills enable organizations to achieve their own results and simplify their processes. She applies a fresh, energetic, fun, practical, easy-to-apply, innovative approach to BCM, Security, and Risk.
Her 'alter ego' includes being a lead singer in SophieG Music and contributing to the global charity playing for Change, which provides music education to children in disadvantaged regions.
Loris Mansiamina
A Senior GRC Professional consultant for Small, Medium and large companies. Over 10 years, Loris has been assisting clients in both public and private sectors about various matters relating to Gouvernance, Risk Management and Compliance (GRC), Digital transformation, cyber security program management, ISO 27k & ISO 20k implementation, COBIT & ITIL implementation, etc.
Date: December 19, 2023
Tags: ISO, ISO/IEC 27001, ISO/IEC 27035, Cybersecurity, Information Security
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
ISO/IEC 27035 Information Security Incident Management - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/yT8gxRZD_4c
Information Security between Best Practices and ISO StandardsPECB
Main points covered:
• Information Security best practices (ESA, COBIT, ITIL, Resilia)
• NIST security publications (NIST 800-53)
• ISO standards for information security (ISO 20000 and ISO 27000 series)
- Information Security Management in ISO 20000
- ISO 27001, ISO 27002 and ISO 27005
• What is best for me: Information Security Best Practices or ISO standards?
Presenter:
This webinar was presented by Mohamed Gohar. Mr.Gohar has more than 10 years of experience in ISM/ITSM Training and Consultation. He is one of the expert reviewers of CISA RM 26th edition (2016), ISM Senior Trainer/Consultant at EGYBYTE.
Link of the recorded session published on YouTube: https://youtu.be/eKYR2BG_MYU
Pengembangan Kebijakan dan
Strategi Pengamanan Data
Digital dalam Perguruan Tinggi
Sarwono Sutikno
Webinar Keamanan Data Digital, SPI IT
Seri ISO 27001 SMKI
(Sistem Manajemen Keamanan Informasi)
Sarwono Sutikno
Webinar Keamanan Data Digital, SPI ITB
Rabu, 3 Agustus 2022
v2
Seri ISO 27001 Sistem Manajemen Keamanan Informasi
A. Sumber terbuka https://www.iso27001security.com/
B. ISO/IEC 27000:2018 Information technology — Security techniques
— Information security management systems — Overview and
vocabulary
C. ISO/IEC FDIS 27001 Information security, cybersecurity and privacy
protection — Information security management systems —
Requirements
D. ISO/IEC 27002:2022 Information security, cybersecurity and privacy
protection — Information security controls
Rangkuman
• Indeks KAMI (KeAManan Informasi) adalah ukuran untuk mencapai
batas dasar ISO 27001 Persyaratan SMKI;
• Seri ISO 27001 SMKI yang utama:
• ISO 27000 Gambaran umum dan kosakata
• ISO 27001 Persyaratan
• ISO 27002 Kendali Keamanan Informasi
• Wajib dijalankan:
• Plan: Klausul 4 Konteks organisasi s/d Klausul 7 Dukungan ISO 27001
• Do: Klausul 8 Operasi ISO 27001
• Check: Klausul 9 Evaluasi Kinerja ISO 27001
• Act: Klausul 10 Peningkatan ISO 27001
Perbandingan standar Sistem Manejemen Keamanan Informasi dgn Sistem Manajemen Anti Penyuapan dgn Sistem Manajemen Mutu dgn Sistem Manajemen Organisasi Pendidikan, Jika sudah menerapkan salah satu Sistem Manajemen maka untuk menerapkan yang lain sedikit sekali usaha tambahannya. Perubahan Manajemen Risiko adalah yang paling awal. Semoga bermanfaat.
Tata Kelola Informasi & Teknologi (I&T),
dan Aset Informasi
Webinar
Peran Teknologi Informasi dan Audit Internal dalam Akselerasi Inovasi di
Perguruan Tinggi
Sarwono Sutikno, Dr.Eng,CISA,CISSP,CISM,CSX-F
INSITUT TEKNOLOGI BANDUNG
Senin, 29 Juni 2020
• Become familiar with the internal audit profession and The Institute of
Internal Auditors (IIA).
• Understand the mandatory IPPF guidance:
• The Mission of Internal Audit,
• the Core Principles for the Professional Practice of Internal Auditing,
• the Definition of Internal Auditing,
• the Code of Ethics, and
• the International Standards for the Professional Practice of Internal
Auditing (Standards).
• Understand the strongly recommended IPPF guidance:
• Implementation Guidance and Supplemental Guidance.
• Understand the attributes of a well-executed risk management model
(process)
• COSO Internal Control Framework
• Describe internal auditors’ compliance and fraud-related responsibilities
related to protecting the organization from regulatory violations.
• Be familiar with selected computer-assisted audit techniques, including
generalized audit software.
• Understand the planning, fieldwork, and reporting processes of an audit
• Learn the elements of a finding and the proper presentation in an audit
report
• Understand quality assurance, how it operates, and why it is important to
the internal audit function.
Pemahaman Keamanan Informasi terkait Internal Control, konteks pencapaian tujuan organisasi. Jangan sampai karena tidak boleh diketahui oleh suatu unit maka unit lain tidak boleh akses, sehingga ketersediaan untuk Penambangan Data untuk mendapatkan insight terhambat. Aset Informasi tidak dapat dimanfaatkan untuk pencapaian tujuan
Segala bentuk pemberian kepada pegawai negeri atau penyelenggara negara dinamakan gratifikasi. Sejak disahkannya Undang-Undang Nomor 20 Tahun 2001 tentang Perubahan atas Undang-Undang Nomor 31 Tahun 1999 tentang Pemberantasan Tindak Pidana Korupsi, mereka berkewajiban untuk menolak setiap penerimaan gratifikasi yang berhubungan dengan jabatan dan berlawanan dengan tugas atau kewajiban penerima. Apabila karena kondisi tertentu tidak bisa menolak, maka melaporkan penerimaan tersebut kepada KPK merupakan upaya kedua untuk membebaskan dari ancaman hukuman.
§ Rancang bangun portable hacking station menggunakan Raspberry pi telah
berhasil dilakukan sehingga menghasilkan sebuah alat yang dapat dipergunakan untuk melakukan kegiatan etical hacking yang efektif dan efisien.
§ Pengujian dilakukan dengan melakukan simulasi hacking menggunakan portable hacking station sehingga dapat diverifikasi kesesuaiannya dengan kebutuhan spesifikasi yang telah ditetapkan. Alat ini berhasil melakukan wireless security testing, yaitu dengan mendapatkan password Wifi dengan skema MITM pada AP yang tidak terproteksi terhadap serangan deauthentication attack.
§ Tinjauan keamanan dari portable hacking station dibuat berdasarkan standar
ISO/IEC 15408 Common Criteria for IT Security Evaluation part 1 – 3 versi 3.1:2017, dan ISO/IEC TR 15446 Guide for the production of Protection Profiles and Security Targets dalam bentuk dokumen Security Target.
▷ Apa yang perlu diatur agar tata kelola dan manajemen Keamanan SPBE dapat mendukung pencapaian tujuan SPBE?
▷ Bagaimana cara menghitung efektivitas pengaturan untuk Sistem Tata Kelola
Keamanan SPBE?
▷ Kecukupan pengaturan tata kelola dan manajemen yang diperlukan untuk Keamanan SPBE.
▷ Ketersediaan sistem manajemen kinerja Keamanan SPBE untuk mengukur keefektifan pengaturan.
Indeks Presepsi Korupsi Indonesia 20 thn Reformasi - TII. Semoga IPK Indonesia tetap naik dengan usaha kita bersama rakyat termasuk mahasiswa dan STM serta semua pemuda-pemudi harapan bangsa. BERANI JUJUR HEBAT
Pemilihan Umum 2019 tinggal hitungan hari. sebelum nyoblos, yuk baca dulu laporan utama di majalah Integrito yang bertajuk "Menuju Catatatan Sejarah".
Silahkan unduh versi PDF di link ini :
https://www.kpk.go.id/id/publikasi/kajian-dan-penelitian/majalah-integrito/832-menuju-catatan-sejarah
Jangan lupa untuk pilih yang jujur :)
salam antikorupsi!
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
1. Informasi, Keamanan, Risiko, Kendali,
Sasaran Kendali dan Perubahan
Wisuda STSN, Ciseeng, Bogor
10 November 2015
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM
Sekolah Teknik Elektro dan Informatika
Institut Teknologi Bandung
2. Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM
Current:
• Cybersecurity Nexus Liaison, ISACA Indonesia Chapter
• ISACA Academic Advocate at ITB
• SME for Information Security Standard for ISO at ISACA HQ
• Associate Professor at School of Electrical Engineering and Informatics, Institut Teknologi Bandung
• Ketua WG Layanan dan Tata Kelola TI, anggota WG Keamanan Informasi serta Anggota Panitia Teknis 35-01
Program Nasional Penetapan Standar bidang Teknologi Informasi, BSN– Kominfo.
• Lead Asesor Lembaga Sertifikasi SNI ISO/IEC 27001:2013 KAN
Past:
• Ketua Kelompok Kerja Evaluasi TIK Nasional, Dewan TIK Nasional (2007-2008)
• Plt Direktur Operasi Sistem PPATK (Indonesia Financial Transaction Reports and Analysis Center, INTRAC),
April 2009 – May 2011
Professional Certification:
• Professional Engineering (PE), the Principles and Practice of Electrical Engineering, College of Engineering,
the University of Texas at Austin. 2000
• IRCA Information Security Management System Lead Auditor Course, 2004
• ISACA Certified Information System Auditor (CISA). CISA Number: 0540859, 2005
• Brainbench Computer Forensic, 2006
• (ISC)2 Certified Information Systems Security Professional (CISSP), No: 118113, 2007
• ISACA Certified Information Security Manager (CISM). CISM Number: 0707414, 2007
Award:
• (ISC)2 Asia Pacific Information Security Leadership Achievements (ISLA) 2011 award in category Senior
Information Security Professional. http://isc2.org/ISLA
2
7. ISACA defines information security as something that:
Ensures that information is readily available (availability),
when required, and protected against disclosure to
unauthorised users (confidentiality) and improper
modification (integrity).
7
Keamanan informasi versi isaca
Information security is a business enabler that is strictly bound to
stakeholder trust, either by addressing business risk or by creating
value for an enterprise, such as competitive advantage.
At a time when the significance of information and related technologies
is increasing in every aspect of business and public life, the need to
mitigate information risk, which includes protecting information and
related IT assets from ever-changing threats, is constantly intensifying.
8. 8
Keamanan informasi
......... pemerintah negara Indonesia yang melindungi
segenap bangsa Indonesia dan seluruh tumpah darah
Indonesia dan untuk memajukan kesejahteraan
umum, mencerdaskan kehidupan
bangsa, dan ikut melaksanakan ketertiban dunia yang
berdasarkan kemerdekaan, perdamaian abadi dan
keadilan sosial........
Pemanfaatan INFORMASI sebagai darah nadi kehidupan
bangsa
dalam perspektif Pertumbuhan Ekonomi
untuk Kesejahteraan Rakyat
9. 9
Keamanan Nasional
......... pemerintah negara Indonesia yang melindungi
segenap bangsa Indonesia dan seluruh tumpah darah
Indonesia dan untuk memajukan kesejahteraan
umum, mencerdaskan kehidupan
bangsa, dan ikut melaksanakan ketertiban dunia yang
berdasarkan kemerdekaan, perdamaian abadi dan
keadilan sosial........
Pemanfaatan INFORMASI sebagai darah nadi kehidupan
bangsa
dalam perspektif Pertumbuhan Ekonomi
untuk Kesejahteraan Rakyat
10. Topik
• Informasi dan Keamanan
• Risiko, Kendali, Sasaran Kendali
• Perubahan
• Kemerdekaan
10
12. PP 60/2008 Sistem Pengendalian Intern
Pemerintah
12
Pasal 3 (1) d. informasi dan
komunikasi (Information and
Communication Internal Control)
Psl 3 (1) c. kegiatan pengendalian
(Internal Control Activities)
Psl 3 (1) b. penilaian risiko
(Internal Control Risk Assessment)
Psl 3 (1) a. lingkungan pengendalian
(Internal Control Environment)
TuPokSiInstansi
BisnisProses,SPO,dll
Psl 3 (1) e. pemantauan
pengendalian intern (Internal
Control Monitoring)
PeraturanPerundangan
16. Prinsip SNI ISO/IEC 31000
a. Risk management creates and protects value
b. Risk management is an integral part of all organizational processes
c. Risk management is part of decision making
d. Risk management explicitly addresses uncertainty
e. Risk management is systematic, structured and timely
f. Risk management is based on the best available information
g. Risk management is tailored
h. Risk management takes human and cultural factors into account
i. Risk management is transparent and inclusive.
j. Risk management is dynamic, iterative and responsive to change
k. Risk management facilitates continual improvement of the
organization
16
17. 4 Context of the
organization
5
Leadership
6 Planning 7 Support 8
Operation
9
Performance
evaluation
10
Improvemen
t
4.1
Understanding
the organization
and its context
5.1
Leadership
and
commitmen
t
6.1 Actions
to address
risks and
opportunitie
s
7.1
Resources
8.1
Operational
planning
and control
9.1
Monitoring,
measuremen
t, analysis
and evaluation
10.1
Nonconformi
ty and
corrective
action
4.2
Understanding
the needs and
expectations of
interested
parties
5.2 Policy 6.2
Information
security
objectives
and plans to
achieve
them
7.2
Competence
8.2
Information
security risk
assessment
9.2 Internal
audit
10.2
Continual
improvement
4.3 Determining
the scope of the
information
security
management
system
7.3
Awareness
8.3
Information
security risk
treatment
9.3
Management
review
4.4 Information
security
7.4
Communicat 17
MSS series: ISO 9000, 27000, 14000, 20000 (?)
19. Hubungan antar Kerangka
COBIT 5
Panduan Umum Tata Kelola TIK Nas
+
Kuesioner Evaluasi Pengendalian Intern TIK
Internal Control
Framework COSO
SNI ISO 38500
PP60/2008
Sistem Pengendalian Intern
Pemerintah
TataKelolaTataKelolaTIManajemenTI
SNI ISO 27001SNI ISO 20000
19
20. Hubungan antar Kerangka
Keamanan
COBIT 5
Panduan Umum Tata Kelola TIK Nas
+
Kuesioner Evaluasi Pengendalian Intern TIK
Internal Control
Framework COSO
SNI ISO 38500
PP60/2008
Sistem Pengendalian Intern
Pemerintah
TataKelolaManajemenPerangkat
SNI ISO 20000
20
RSNI ISO 27013
SNI ISO 27014
Governance of Information Security
SNI ISO 15408
Common Criteria
SNI ISO 27001
Information Security Management System
21. Evaluation Assurance Levels (EAL)
1. Functionally tested
2. Structurally tested
3. Methodically tested and checked
4. Methodically designed, tested, and reviewed
5. Semi-formally designed and tested
6. Semi-formally verified design and tested
7. Formally verified design and tested
22. Topik
• Informasi dan Keamanan
• Risiko, Kendali, Sasaran Kendali
• Perubahan
• Kemerdekaan
22
23. Perubahan SNI ISO/IEC 27001:2013
Konteks organisasi Lingkungan organisasi
Isu, risiko dan kesempatan Perubahan dari hanya preventiv
Pihak berkepentingan Perubahan dari stakeholder
Kepemimpinan Persyaratan pimpinan puncak
Komunikasi Sejalan dgn PP60/2008 SPIP Pasal 3 angka 1 huruf d
Sasaran Keamanan Informasi Tiap tingkat dan fungsi harus mempunyai sasaran
keamanan informasi
Penilaian Risiko Identifikasi aset, ancaman dan kelemahan bukan
lagi persyaratan identifikasi risiko keamanan info
Pemilik Risiko Menggantikan pemilik aset
Rencana Penanganan Risiko Efektivitas rencana penangan risiko lebih penting
dari efektivitas kendali
Kendali Kendali ditentukan dalam proses penanganan risiko,
bukan lagi dipilih dari Annex A SNI ISO/IEC27001
Informasi terdokumen Mengganti dokumen dan catatan
Evaluasi Kinerja Termasuk pengukuran SMKI dan efektivitas rencana
penanganan risiko
Perbaikan berkesinambungan Metoda selain PDCA dapat dipakai