This presentation will draw on best practices from ISO/IEC 27001, 27002, COBIT and the author's experiences in internal audit and information security.
Areas Covered in the seminar:
- Background of the need for an ISMS.
- The Plan-Do-Check-Act model.
- The need for Risk Management.
- Must use a top-down approach vs. bottom up.
- How to leverage the IIA's GAIT-R to move faster.
- How to select and blend layered controls.
- The need for Situational Awareness.
Who Will Benefit:
- IT operations and support staffs as well as compliance
- Audit and information security personnel who are looking for best practices relating to Access Management
Course Provider

George Spafford,


