Date post: | 15-Feb-2017 |
Category: |
Leadership & Management |
Upload: | cssrl-pune |
View: | 374 times |
Download: | 1 times |
IT Governance and Information System Security Management
Global Opportunities and Career ProspectsPRESENTED BY CSSRL ACCREDITED EXTENSION CENTER PUNE
What is IT Security ?• IT Security is the body of technologies, processes and practices designed to
protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber security.
• Its all about maintaining Information CONFIDENTIALITY, INTEGRITY & AVAILABILITY
• An Industry that is currently strengthening Parent and Associated Business Backbone of every Commercial or Non-Commercial Enterprise Setup.
What is IT Security ?
Information Security
CConfidentiality
AAvailabilityI
Integrity
Assurance that the information is accessible only to those authorized to have access
Confidentiality breaches may occur due to improper data handling or a hacking attempt
The trustworthiness of data or resources in terms of preventing improper and unauthorized changes
Assurance that information can be relied upon to be sufficiently accurate for its purpose
Assurance that the systems responsible for delivering,
storing, and processing information are accessible
when required by the authorized users
Why IT Security?
The increasing number of security breaches has led to increasing information security concerns among organizations worldwide.
Organizations and their information systems and networks are exposed with SECURITY THREATS such as fraud, espionage, fire, flood and sabotage from a wide range of sources.
What is IT Governance?• IT Governance or Information Security Management Systems (ISMS) is a systematic
and structured approach to managing information so that it remains secure.
• ISMS implementation includes policies, processes, procedures, organizational structures and software and hardware functions.
• ISMS implementation carries organization’s objectives, security requirements, processes employed, size and structure.
Why IT Governance?
• 100% Secured Business Process Model is IMPOSSIBLE though every Organization aspires for it.
• Thus there is a need to look at information security from a HOLISTIC PERSPECTIVE , and to have an information security management methodology to protect information systematically. This is where the need for ISMS comes in.
• ACHIEVING INFORMATION SECURITY is a huge challenge for organization as it CANNOT BE ACHIEVED THROUGH TECHNOLOGICAL MEANS ALONE.
Why IT Governance?Information Security Management System
Structured Management of Information System
Conformity with Best Security Practices
Major Prevention against Data Protection Issues
Global Positioning and Reputation
Reduction in Cost against Information Loss
Improved Returns on Security Investment
Global Standardization
Reliable Service Model for End users and Clients-Customers
And More…
Threats
Legislation
Identity Mgmt Assurance
Controls
BusinessImpacts
Assets
OrganizationInformation System
exposing To a loss of
causingcausing
which are mitigated bywhich requirecausing
exploit +
which protect against
reduce
+
+
Vulnerabilities
ConfidentialityIntegrity
Availability
Typical Business Security Cycle
Cycle Begins
Who needs IT Governance ?SOFTWARE
DEVELOPMENT FIRMSBANKING
(ONLINE-REGULAR)TELECOMMUNICATION
INDUSTRY
GOVERNMENT INFORMATION CENTERS ATOMIC POWER HOUSES MEDIA
EDUCATIONAL INSTITUTIONS ONLINE RETAIL INDUSTRY IT SERVICE INDUSTRY
DEFENCE INSTITUTIONS AND FIRMS STOCK MARKET SOCIAL MEDIA
WEB DEVELOPMENT INDUSTRY HEALTH CARE INDUSTRY WEATHER FORCASTING
SECTOR
HOSPITALITY INDUSTRY AUTOMATION INDUSTRYAND EVERY INDUSTRY THAT
RELIES UPON IT BACKBONE
Career in IT GovernanceCurrently as almost every Commercial Non-Commercial Enterprise Setup relies upon IT backbone.EVERY INDUSTRY REQUIRES IT SECURITY MANAGERS’ WORKFORCE to ensure Robust Security Governance.
Chief Information Security Manager
Security AuditorSecurity Architect
Regulatory Compliance ManagerISO 27001 Lead Auditor
ISO 27001 Lead ImplementerSecurity Operations Manager
Network ManagerSecurity Analyst
Risk AnalystRisk Assessment Manager
Security ConsultantAnd More than 15 Career Profile
Career in IT Governance
How to Get in ?• More than 67% of IT Security Professionals Across World are
Commerce or Non-IT Graduates. Thus simply EARN ELIGIBILITY.
Graduation
• EARN SKILLS AND HANDS ON EXPERIENCE through Professional Training strictly aligned with Industrial Trends and Standards
Industrial Training
• Get your Skills Globally Certified with ISACA, ISC2, BSI, PCI, Axelos and other International Certification Bodies. EARN CREDITABILITY
Global Certification
• IT Security Management Industry favors Experienced Management Professionals for Top Recruitments. Thus EARN IT SECURITY ASSOCIATED DOMAIN EXPERIENCE.
Work Experience
• Your Industrial worth at Globe is over 70000$ ANNUALLY now. Ready to Hit Opportunity
How can we help you ?
Who we are?Cyber Security Studies and Research Laboratory, also popular as CSSRL can be well defined as an IT Security Company incorporated under 1956 Company Act, Ministry of Corporate Affairs, GOI
Offering a Spectrum of more than 17 State-of-Art Professional and Intellectual Services, CSSRL is motivated by its rich ethics commitments for disseminating Cyber Security Professional Training and improvising best of IT Security Practices and Standards across variegated Critical Information Systems.
CSSRL operations span THREE MAJOR BUSINESS VERTICALS
1. Education and Training Services2. Business Services (Security Services)3. Franchising Services
• More than 67% of IT Security Professionals Across World are Commerce or Non-IT Graduates. Thus simply EARN ELIGIBILITY.
Graduation
• EARN SKILLS AND HANDS ON EXPERIENCE through Professional Training strictly aligned with Industrial Trends and Standards
Industrial Training
• Get your Skills Globally Certified with ISACA, ISC2, BSI, PCI, Axelos and other International Certification Bodies. EARN CREDITABILITY
Global Certification
• IT Security Management Industry favors Experienced Management Professionals for Top Recruitments. Thus EARN IT SECURITY ASSOCIATED DOMAIN EXPERIENCE.
Work Experience
• Your Industrial worth at Globe is over 70000$ ANNUALLY now.
Ready to Hit Opportunity
Bridging the Gap
CSSRL Pedagogy HighlightsCSSRL carries Training on More than 17 Domains of IT Security out of which following areas generates Trained Security Managers:
• IT System Security Management
• Corporate Security Modeling
• ISO 27001 Lead Audit
• Business Continuity
• Policy-Procedure Development
• Risk Assessment and Analysis
• Risk Mitigation and Controls
CSSRL introduces Certification in IT Governance (CITG) as Foundation Program in IT System Security Management.
Certification in IT Governance (CITG)• CITG V1.0 or Certification in IT Governance is a
highly professional certification to assist IT Experts and Organizations align IT Framework and Security Model with Structured Business Strategies to ensure continuity of Business Operations without breach into Critical Information Systems. Accredited with IADL(UK), CITG sets a globally recognized International Credit-based Certification in Information Security Management Systems.
• CITG V1.0 furthers this training by offering Industrial Training for International Certifications like CISA, CISM , ISO 27001 etc
• CITG V1.0 also carries optional opportunity for IT Security Management Internship that fulfills Work Experience Requirement to fetch Best place in Industry.
Any Question ?
Contact Us @CSSRL AEC, Near Dena Bank, Opposite Dominos Pizza,Sanapati Bapat Road, Pune-411016http://pune.cssrl.in/
09820378258 / 02041217411
https://www.facebook.com/cssrlpune
https://in.linkedin.com/in/cssrlpune
https://twitter.com/cssrl_pune