+ All Categories
Home > Leadership & Management > IT governance and Information System Security

IT governance and Information System Security

Date post: 15-Feb-2017
Category:
Upload: cssrl-pune
View: 374 times
Download: 1 times
Share this document with a friend
19
IT Governance and Information System Security Management Global Opportunities and Career Prospects PRESENTED BY CSSRL ACCREDITED EXTENSION CENTER PUNE
Transcript
Page 1: IT governance and Information System Security

IT Governance and Information System Security Management

Global Opportunities and Career ProspectsPRESENTED BY CSSRL ACCREDITED EXTENSION CENTER PUNE

Page 2: IT governance and Information System Security

What is IT Security ?• IT Security is the body of technologies, processes and practices designed to

protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber security.

• Its all about maintaining Information CONFIDENTIALITY, INTEGRITY & AVAILABILITY

• An Industry that is currently strengthening Parent and Associated Business Backbone of every Commercial or Non-Commercial Enterprise Setup.

Page 3: IT governance and Information System Security

What is IT Security ?

Information Security

CConfidentiality

AAvailabilityI

Integrity

Assurance that the information is accessible only to those authorized to have access

Confidentiality breaches may occur due to improper data handling or a hacking attempt

The trustworthiness of data or resources in terms of preventing improper and unauthorized changes

Assurance that information can be relied upon to be sufficiently accurate for its purpose

Assurance that the systems responsible for delivering,

storing, and processing information are accessible

when required by the authorized users

Page 4: IT governance and Information System Security

Why IT Security?

The increasing number of security breaches has led to increasing information security concerns among organizations worldwide.

Organizations and their information systems and networks are exposed with SECURITY THREATS such as fraud, espionage, fire, flood and sabotage from a wide range of sources.

Page 5: IT governance and Information System Security

What is IT Governance?• IT Governance or Information Security Management Systems (ISMS) is a systematic

and structured approach to managing information so that it remains secure.

• ISMS implementation includes policies, processes, procedures, organizational structures and software and hardware functions.

• ISMS implementation carries organization’s objectives, security requirements, processes employed, size and structure.

Page 6: IT governance and Information System Security

Why IT Governance?

• 100% Secured Business Process Model is IMPOSSIBLE though every Organization aspires for it.

• Thus there is a need to look at information security from a HOLISTIC PERSPECTIVE , and to have an information security management methodology to protect information systematically. This is where the need for ISMS comes in.

• ACHIEVING INFORMATION SECURITY is a huge challenge for organization as it CANNOT BE ACHIEVED THROUGH TECHNOLOGICAL MEANS ALONE.

Page 7: IT governance and Information System Security

Why IT Governance?Information Security Management System

Structured Management of Information System

Conformity with Best Security Practices

Major Prevention against Data Protection Issues

Global Positioning and Reputation

Reduction in Cost against Information Loss

Improved Returns on Security Investment

Global Standardization

Reliable Service Model for End users and Clients-Customers

And More…

Page 8: IT governance and Information System Security

Threats

Legislation

Identity Mgmt Assurance

Controls

BusinessImpacts

Assets

OrganizationInformation System

exposing To a loss of

causingcausing

which are mitigated bywhich requirecausing

exploit +

which protect against

reduce

+

+

Vulnerabilities

ConfidentialityIntegrity

Availability

Typical Business Security Cycle

Cycle Begins

Page 9: IT governance and Information System Security

Who needs IT Governance ?SOFTWARE

DEVELOPMENT FIRMSBANKING

(ONLINE-REGULAR)TELECOMMUNICATION

INDUSTRY

GOVERNMENT INFORMATION CENTERS ATOMIC POWER HOUSES MEDIA

EDUCATIONAL INSTITUTIONS ONLINE RETAIL INDUSTRY IT SERVICE INDUSTRY

DEFENCE INSTITUTIONS AND FIRMS STOCK MARKET SOCIAL MEDIA

WEB DEVELOPMENT INDUSTRY HEALTH CARE INDUSTRY WEATHER FORCASTING

SECTOR

HOSPITALITY INDUSTRY AUTOMATION INDUSTRYAND EVERY INDUSTRY THAT

RELIES UPON IT BACKBONE

Page 10: IT governance and Information System Security

Career in IT GovernanceCurrently as almost every Commercial Non-Commercial Enterprise Setup relies upon IT backbone.EVERY INDUSTRY REQUIRES IT SECURITY MANAGERS’ WORKFORCE to ensure Robust Security Governance.

Chief Information Security Manager

Security AuditorSecurity Architect

Regulatory Compliance ManagerISO 27001 Lead Auditor

ISO 27001 Lead ImplementerSecurity Operations Manager

Network ManagerSecurity Analyst

Risk AnalystRisk Assessment Manager

Security ConsultantAnd More than 15 Career Profile

Page 11: IT governance and Information System Security

Career in IT Governance

Page 12: IT governance and Information System Security

How to Get in ?• More than 67% of IT Security Professionals Across World are

Commerce or Non-IT Graduates. Thus simply EARN ELIGIBILITY.

Graduation

• EARN SKILLS AND HANDS ON EXPERIENCE through Professional Training strictly aligned with Industrial Trends and Standards

Industrial Training

• Get your Skills Globally Certified with ISACA, ISC2, BSI, PCI, Axelos and other International Certification Bodies. EARN CREDITABILITY

Global Certification

• IT Security Management Industry favors Experienced Management Professionals for Top Recruitments. Thus EARN IT SECURITY ASSOCIATED DOMAIN EXPERIENCE.

Work Experience

• Your Industrial worth at Globe is over 70000$ ANNUALLY now. Ready to Hit Opportunity

Page 13: IT governance and Information System Security

How can we help you ?

Page 14: IT governance and Information System Security

Who we are?Cyber Security Studies and Research Laboratory, also popular as CSSRL can be well defined as an IT Security Company incorporated under 1956 Company Act, Ministry of Corporate Affairs, GOI

Offering a Spectrum of more than 17 State-of-Art Professional and Intellectual Services, CSSRL is motivated by its rich ethics commitments for disseminating Cyber Security Professional Training and improvising best of IT Security Practices and Standards across variegated Critical Information Systems.

CSSRL operations span THREE MAJOR BUSINESS VERTICALS

1. Education and Training Services2. Business Services (Security Services)3. Franchising Services

Page 15: IT governance and Information System Security

• More than 67% of IT Security Professionals Across World are Commerce or Non-IT Graduates. Thus simply EARN ELIGIBILITY.

Graduation

• EARN SKILLS AND HANDS ON EXPERIENCE through Professional Training strictly aligned with Industrial Trends and Standards

Industrial Training

• Get your Skills Globally Certified with ISACA, ISC2, BSI, PCI, Axelos and other International Certification Bodies. EARN CREDITABILITY

Global Certification

• IT Security Management Industry favors Experienced Management Professionals for Top Recruitments. Thus EARN IT SECURITY ASSOCIATED DOMAIN EXPERIENCE.

Work Experience

• Your Industrial worth at Globe is over 70000$ ANNUALLY now.

Ready to Hit Opportunity

Bridging the Gap

Page 16: IT governance and Information System Security

CSSRL Pedagogy HighlightsCSSRL carries Training on More than 17 Domains of IT Security out of which following areas generates Trained Security Managers:

• IT System Security Management

• Corporate Security Modeling

• ISO 27001 Lead Audit

• Business Continuity

• Policy-Procedure Development

• Risk Assessment and Analysis

• Risk Mitigation and Controls

CSSRL introduces Certification in IT Governance (CITG) as Foundation Program in IT System Security Management.

Page 17: IT governance and Information System Security

Certification in IT Governance (CITG)• CITG V1.0 or Certification in IT Governance is a

highly professional certification to assist IT Experts and Organizations align IT Framework and Security Model with Structured Business Strategies to ensure continuity of Business Operations without breach into Critical Information Systems. Accredited with IADL(UK), CITG sets a globally recognized International Credit-based Certification in Information Security Management Systems.

• CITG V1.0 furthers this training by offering Industrial Training for International Certifications like CISA, CISM , ISO 27001 etc

• CITG V1.0 also carries optional opportunity for IT Security Management Internship that fulfills Work Experience Requirement to fetch Best place in Industry.

Page 18: IT governance and Information System Security

Any Question ?

Page 19: IT governance and Information System Security

Contact Us @CSSRL AEC, Near Dena Bank, Opposite Dominos Pizza,Sanapati Bapat Road, Pune-411016http://pune.cssrl.in/

09820378258 / 02041217411

[email protected]

https://www.facebook.com/cssrlpune

https://in.linkedin.com/in/cssrlpune

https://twitter.com/cssrl_pune


Recommended