Program Overview
In this program you will learn about...
This Program provides the necessary step by step approach and methodology for systematically evaluating an information system's security.
It includes
- Information as a source of competitive advantage
- Information Needs for Decision Making
- Limiting Information Access
- Systematic evaluation of information system security.
Program Content
(Each program is customized based on real needs of the participants - Day by Day Agenda will be provided to the participants at the start of the program)
In this program you will learn about the Computer Security Fraud Prevention…
- Practical Issues - The Security Situation
- Security Strategic Issues
- Industry Methodologies, Standards & Best Practices
- Business Mapping of Operations to Identify Security Risks - Flow Charts
- How Secure are Your Computer Security Fraud Prevention Practices?
- How safe is your computer system from Viruses, hacking and fraud.
- Analyzing
- Do you have a problem?
- How serious is it?
- What should you do?
- How to evaluate the risk?
- How to implement controls?
- Methodology for
- How to identify information assets and controls?
- How to quantify risks, likely damage causes for concern?
- To Understand the responses to any threat know which to use.
- Check your IT infrastructure - Identify weak links
- Review the success of key staff members in implementing controls
- Clarify your vulnerability to outsiders and staff - including providing them an Action Plan to Preserve Data Security on their Systems and Work Methods
- Planning the Security System
- Information Technology Security Standards Adoption
- Implementing Computer Security Improvements