Managerial Primer for Ensuring Information Security


Dr. Robert E. Davis obtained a Bachelor of Business Administration in Accounting and Business Law, a Master of Business Administration in Management Information Systems, and a Doctor of Business Administration in Information Systems Management from Temple, West Chester, and Walden University; respectively. Moreover, during his twenty years of involvement in education, Dr. Davis acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology. Dr. Davis also obtained the Certified Information Systems Auditor (CISA) certificate - after passing the 198........

Overview

Most enterprises actively seek maximizing stakeholder return on investments and fostering superior customer relations to sustain creation justification. With information technologies considered indispensable to providing processing efficiency, communication expediency and information reliability for stakeholders organizations need to safeguard adequately information assets because they have measurable value. Management typically requires a governance framework that enables organizational alignments, judicious resource allotments, risk management, value delivery and performance measurements to accomplish this security necessity.

Why should you attend this webinar?

Instituting and sustaining information security governance (ISG) requires comprehensive planning and organizing; robust acquisitions and implementations; effective delivery and support; as well as continuous monitoring and evaluation to address the myriad of managerial, operational, and technical issues that can thwart satisfying an enterprise's declared mission. Consequently, information security requires an adaptive balance between sound management and applied technology. Sound management enables assuring adequate asset safeguarding while applied technology can introduce efficiencies for addressing potential external or internal threats.
Information security design, deployment, and assurance require dedication to continuous improvement to ensure optimum effectiveness and efficiency. Whereby, confirmation of compliance with legislation, regulations, policies, directives, procedures, standards, and rules enable asserting superior ISG. Nonetheless, monitoring and evaluating the current state of implemented controls may take a variety of forms; including control self-assessments and information technology (IT) audits. Furthermore, an IT auditor may not be the individual who executes an organization's information security internal control review (ICR). However, an IT auditor may subsequently assess an ICR for effectiveness and/or efficiency. In the regulatory arena, a negative finding, coupled with prompt corrective actions can mitigate civilly and criminal enforcement penalties, thereby potentially reducing or avoiding legal risks.

Areas Covered in the Session:

Who can Benefit:



Webinar Id: LSHCRDA001

Training Options:

Duration: 60 mins

 04/16/2018

 10:00 AM PT | 01:00 PM ET

 Single Attendee: [Only for one participant]

$179 (Live)                    $319 (Live + Recorded)

 Multiple Attendee: [For a group of 2-5 participants]

$368 (Live)                    $495 (Live + Recorded)

 Corporate Attendee: [For a group of 6-10 Participants]

$741 (Live)                    $1157 (Live + Recorded)

 Recorded: [Six month unlimited access]

$167 (Single Attendee) $599 (Unlimited Attendee)

Refund Policy
Upcoming Webinar: Life Sciences and Healthcare
How to do a HIPAA Risk analysi....
By: Jonathan P. Tomes
When: 04/23/2018 | 10:00 AM PT |01:00 PM ET
Price: $179
FDA/EU MDSAP Inspections - Get....
By: Marie Dorat
When: 04/24/2018 | 12:30 PM PT |3:30 PM ET
Price: $179

More Webinar

Past Webinar: Life Sciences and Healthcare
HIPAA Compliant Messaging Plat....
By: Doug McMinn
View it anytime
Price: $167
Mobile Medical Apps (Is It an ....
By: Edwin Waldbusser
View it anytime
Price: $167

More Webinar

    
Copyright © 2018 Compliance Key . All Rights Reserved. Back to Top