event

Blueprint for Information Security

Primary tabs

The headlines continue to tell of the risk to digital information resources: "New Virus!", "Denial of Service Attack!", Financial Data Stolen!" and now "Data Resources Destroyed!" What can you do to manage the risk to your organization's critical data assets? Are you ready to meet your obligation to your stakeholders to protect their interests?

About The Course

This one day course will provide an understanding of the threat to information resources, how to assess current risk levels, and the process to manage risk. You will learn the key elements of how to build and implement an effective information protection program.

Who Should Attend

Individuals at all levels who are charged with protecting digital data resources and want to learn more about their responsibilities and options.

Prerequisites

A basic knowledge of business information systems (operating systems, networks, and databases) will be helpful to gain the maximum benefit from this program but is not mandatory.

Course Objectives

This course is an effective stand-alone overview for those who seek a broad perspective of information security. It also will provide a solid foundation for those who want to pursue further study on the details of building and implementing an information security environment or secure professional certification in this discipline.

You will learn:
The nature of the treat to information resources How to assess the risk to your organization The elements of the process needed to manage this risk including:

Policy
Planning
Implementation

Fundamentals of information contingency planning including:

Incident response and business continuity plans.

Status

  • Workflow Status:Published
  • Created By:Eric Huffman
  • Created:07/04/2006
  • Modified By:Fletcher Moore
  • Modified:10/07/2016