Vulnerabilities and lack of necessary security skills applicable to today’s technology environments have reached a crisis point and therefore, in order to maintain privacy required and to facilitate efficient communication between agencies, issues of information security, interoperability, and data management must be addressed. Information Security and Data Management training equip participants with knowledge and skills on how to integrate truly effective information security and data management best practices and standards to organizations existing processes, technology assets and management.
At the end of the course, the participants will be able to:
· Security Investment & Measurement
· Cyber Risk Management & Security Metrics
· Enterprise Security Governance & Planning
· Realistic Security
· Effective Incident Response
· Managing Operational Threat
· Developing a Crisis Communications Strategy
· Building an Insider Threat Program
· External Dependency Management
Introduction & Overview
· Introduction
· Significance of Information Security
Information Security Governance
· Information security governance
· Significance of information security
· Security management programs
Risk Management
· Introduction to information security risk management
· Information security risk assessment
· Information security risk analysis
· Mitigation of information security risk
· Continuous information security risk Monitoring
Developing Information Security Strategy
· Importance/significance of information security strategy
· Factors to consider while developing Information security strategy
· Information security Management Responsibilities
Policies, procedures, standards & guidelines
· Introduction and Liability
· Policy Basics
· Policy Lifecycle
· Best Practices and Guidelines
Information security technology
· Introduction to information security technology
· Trusted vs Untrusted technologies
· VLANs
· Information Encryptions
Incident management
· Introduction to Information Security incident management
· Incident management response lifecycle preparation
· Intrusion detection technologies and systems
· Security incident response
Business continuity & disaster recovery
· Introduction to business continuity planning and disaster recovery
· Business continuity phases
· Disaster recovery
· Recovery strategies
· IT Professionals
· Network / System Administrator
· CISO, CTO, CISA, ISO, CIO
· IT Manager, IT administrators
· Anyone who wants to make career in emerging field
Shrikrishna Kulkarni possess more than 26+ years of diverse experience in Banking, Pharma, Manufacturing, Telecom(M&E), and consulting experience in Infrastructure, Cloud, Managed Security Services (MSS), IT Audit, SAP, HANA, technologies supporting infrastructure and applications domain.
Complex IT projects and issues that encompass a wide range of internal and external systems, components, and processes
· Cloud – Private, Public & Hybrid
· Application & infrastructure security
· Business continuity
· Project Management
· Pre-Sales
· Audit & Compliance
Experience in BCP, IT DR solutions (Sanovi, Perpuity) and Implementation, Crisis Management. Designing “DRAAS” as Service, BCMS/ ISMS, IT Service Continuity.
Implementation Experience includes BCP/DR Planning, Impact Analysis on Business, Database Replications Solutions, DR automation solutions, Infrastructure and Applications DR for Complex projects in Pharma, Banking, Manufacturing, M&E
Members | Rs. 9,000 + 18% GST |
Non-Members | Rs. 10,000 + 18% GST |
Bank Details for NEFT | |
---|---|
Account No. | 10996680930 |
IFSC CODE | SBIN0000300 |
Bank Name | State Bank of India |
Branch Address | Mumbai Main Branch |
Cheque /Demand Draft should be drawn in favor of “BOMBAY CHAMBER OF COMMERCE AND INDUSTRY”
Participation only through advance registration
Kindly mail your registration (Name, Cell no, Email Id and GST No) on revati.khare@bombaychamber.com
Revati Khare
Email : international@bombaychamber.com
Tel. (D) + 91 22 6120 0231; (M) + 91 9892029473
Organizer name -
Venue Name -
Event Fees Type
Event or Seminar - Workshop