Enterprise Information Security Management: Tools
What you'll learn
- Student will learn major measures organizations take to manage information security and solve information security problems.
- After learning the course student can compare their own organization with conditions in the courses, to gain a better decission of what models, frameworks and approaches to take to achieve a better level secuirty in their organization.
Requirements
- You should know basic concept of IT security and enterprise management.
- You should have basic understanding on risk management.
Description
The purpose of this series course is to address the growing challenges of managing information security risks in enterprise and government organizations, prompted by the complexity and risks of today’s changing technological landscape, as well as increasingly demanding business aspirations. These challenges are further escalated by the inadequacies of existing risk management models and professional development approaches.
Similar to warfares,In information security, there are various strategies, frameworks, approaches, and models, that have been developed over the years, which could help practitioners design, plan, build, deploy, and operate an information security management program in organizations. In this part, we'll discuss how organizations use them.
By the end of this module, you should gain a level of understanding of the models, frameworks, strategies, and approaches applicable to enterprise information security management; discourse their pros and cons, and apply your learning to given scenarios and in your organizations.
Who this course is for:
- Information Security Managers
- CISO
- CTO
- Security Practitioners
- Security Engineers
- Compliance Managers
- Risk Analysts
- IT Auditors
- IT Managers
Instructors
Publishing books since 1913, CRC Press is a premier global publisher of science, technology, and medical resources. We offer unique, trusted content by expert authors, spreading knowledge and promoting discovery worldwide. We aim to broaden thinking and advance understanding in the sciences, providing researchers, academics, professionals, and students with the tools they need to share ideas and realize their potential.
CRC Press is a member of Taylor & Francis Group, an Informa business.
Meng-Chow Kang is Head of Security Assurance in Asia Pacific Region at Amazon Web Services. He was Director and Chief Information Security Officer of Cisco Systems Asia Pacific, China and Japan from Feb 2009 to June 2017. He’s also one of the board members of ISC2. Besides serving as Convenor, or Chair of the Security Controls and Services Working Group in ISO/IEC JTC 1/SC 27, and a co-Rapporteur for ITU-T SG17 previously, he is also Adjunct Associate Professor at Nanyang Technological University of Singapore.
Dr. Kang received his MSc degree in Information Security from the Royal Holloway and Bedford New College, University of London, and a PhD in Information Security Risk Management at the Southern Cross University, Australia. He has been a Certified Information Systems Security Professional (CISSP) since 1998.
Dr. Kang is author of the CRC Press book Responsive Security: Be Ready to Be Secure.