Certified Information Security Manager

by Inovasi EduTech Claim Listing

Certified Information Security Manager course is offered by Inovasi EduTech. We strive to empower learners with the knowledge, skills, and expertise they need to succeed in today’s rapidly evolving technology landscape.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Inovasi EduTech Logo

img Duration

Please Enquire

Course Details

Certified Information Security Manager course is offered by Inovasi EduTech. We strive to empower learners with the knowledge, skills, and expertise they need to succeed in today’s rapidly evolving technology landscape. We believe that education is a lifelong pursuit and that learning should be engaging, practical, and accessible.

 

Course Outline:

  • Domain 1
  • Information Security Governance
  • Develop an information security strategy, aligned with business goals and directives.
  • Establish and maintain an information security governance framework.
  • Integrate information security governance into corporate governance.
  • Develop and maintain information security policies.
  • Develop business cases to support investments in information security.
  • Identify internal and external influences to the organization.
  • Gain ongoing commitment from senior leadership and other stakeholders.
  • Define, communicate and monitor information security responsibilities
  • Establish internal and external reporting and communication channels.
  • Domain 3
  • Information Security Program Development & Management
  • Develop a security program, aligned with information security strategy
  • Ensure alignment between the information security program and other business functions
  • Establish and maintain requirements for all resources to execute the IS program
  • Establish and maintain IS architectures to execute the IS program
  • Develop documentation that ensures compliance with policies
  • Develop a program for information security awareness and training
  • Integrate information security requirements into organizational processes
  • Integrate information security requirements into contracts and activities of third parties
  • Develop procedures (metrics) to evaluate the effectiveness and efficiency of the IS program
  • Compile reports to key stakeholders on overall effectiveness of the IS program and the underlying business processes in order to communicate security performance.
  • Domain 2
  • Information Risk Management
  • Establish and/or maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value.
  • Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels.
  • Ensure that risk assessments, vulnerability assessments and threat analyses are conducted consistently, and at appropriate times, to identify and assess risk to the organization’s information.
  • Identify, recommend or implement appropriate risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite.
  • Determine whether information security controls are appropriate and effectively manage risk to an acceptable level.
  • Facilitate the integration of information risk management into business and IT processes to enable a consistent and comprehensive information risk management program across the organization.
  • Monitor for internal and external factors (e.g., threat landscape, cybersecurity, geopolitical, regulatory change) that may require a reassessment of risk to ensure that changes to existing or new risk scenarios are identified and managed appropriately.
  • Report noncompliance and other changes in information risk to facilitate the risk management decision-making process.
  • Ensure that information security risk is reported to senior management to support an understanding of the potential impact on the organizational goals and objectives.
  • Domain 4
  •  Information Security Incident Management
  • Define (types of) information security incidents
  • Establish an incident response plan
  • Develop processes for timely identification of information security incidents
  • Develop processes to investigate and document information security incidents
  • Develop incident escalation and communication processes
  • Establish teams that effectively respond to information security incidents
  • Test and review the incident response plan
  • Establish communication plans and processes
  • Determine the root cause of IS incidents
  • Align incident response plan with DRP and BCP.
  • Petaling Jaya Branch

    Suite B8, Bangunan Khas, Lorong 8/1e, Petaling Jaya

Check out more CISM courses in Malaysia

Iconic Training Solutions Logo

Fundamental Of Cyber Security

In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.

by Iconic Training Solutions [Claim Listing ]
Sakra Academy (M) Sdn.Bhd. Logo

CSX Cybersecurity Fundamentals

The Cybersecurity Fundamentals (CSX) course is an excellent way to gain foundational knowledge in cybersecurity, begin to build your knowledge,, and kick-start your career in this crucial area.

by Sakra Academy (M) Sdn.Bhd. [Claim Listing ]
TSY Consultancy International Logo

Cyber Terrorism (Identify, Nullify And Counter)

Cyber Terrorism (Identify, Nullify And Counter) course is offered by TSY Consultancy International. TSY Consultancy International is an international personal and professional growth, training and development company.

by TSY Consultancy International [Claim Listing ]
Axsel Management International Sdn Bhd Logo

Cyber Security Essentials (CSE)

Cyber threats are growing in complexity and the impact scale of cyber-crimes is increasing dramatically. With the advancement in internet technologies and inter-connectivity between devices and sensors, it is inevitable that the volume of personal and corporate data continues to increase.

by Axsel Management International Sdn Bhd [Claim Listing ]
OSI Technology Sdn Bhd Logo

Cyber Defence For Network Administrator

The Cyber Defence for Network Administrator “intensive hands-on” training focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network.

by OSI Technology Sdn Bhd [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy