COMPLIMENTARY WEBINAR - Moving Your IT GRC Program into the New Normal

Speaker

Instructor: Michael C Redmond
Product ID: 706556
Training Level: Intermediate

Location
  • Duration: 60 Min
ISO 27001, ISO 27002, NIST SP800-53 rev.4 Information System Management System (ISMS) are systematic approaches to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process. In this webinar, You will receive valuable information that you can implement. This is a must in the new world that is facing new Information/Cyber risks every year.
Purchase option for this webinar is currently unavailable. Please contact our Customer Care for more info. Webinar All Access Pass Subscription

 

Customer Care

Fax: +1-650-362-2367

Email: [email protected]

Read Frequently Asked Questions

Why Should You Attend:

Attend this session by our expert speaker, Dr. Michael C. Redmond, and learn how to apply ISO 27001 for a robust Information Security Program. The new normal in the working world includes employees working from home and more clients wanting secure virtual meetings, more customers purchasing online etc. The focus of the training can move to how to avoid risks, by implementing the standards, which are ISO27001/27002 including controls. Michael will also touch on NIST SP800-53 rev.4 and how to use it consecutively with ISO. You can either concentrate on one of the standards or if you can cover both of them well and good.

Understanding the standards and the steps to implement these standards, as well as the best practices to implement them is critical in protecting your organizations’ data.

Michael will help your organization to manage the security of the assets such as intellectual property and more.

ISO 27001 describes how to manage information security in a company. According to its documentation, ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system." By applying ISO 2700l and ISO 27002 standards effectively in your organization you can ensure a robust security for your organization's vital information assets.

Protecting your organization's information is critical for the successful management and smooth operation of your organization.

Utilizing ISO/IEC 27001 information security management systems aid your organization in managing and protecting your valuable data and information assets. ISO 27001 not only helps to keep your confidential information secure but also provides customers and stakeholders with a confidence in your risk management system while ensuring you are meeting legal obligations.

Learning Objectives:

  • Ways to fit ISO 27001 information security management system into managing Enterprise Risk.
  • Areas of Risk Management
  • ISO 27000 standards family - for what purpose should each standard be used
  • Important risk and impact assessment and ways to present the risks to management
  • Benefits of ISO 27001, ISO 27002 implementation
  • Information Security Management Systems implementation framework
  • Key elements of ISO 27001
  • Get an overview of audit of implementation strategy

Areas Covered in the Webinar:

  • Risk assessment
  • Security policy
  • Organization of information security
  • Asset management
  • Human resources security
  • Physical and environmental security
  • Communications and operations management
  • Access control
  • Information systems acquisition, development and maintenance
  • Information security incident management
  • Business continuity management
  • Compliance

Who Will Benefit:

  • Security Planners
  • CEOs
  • CIOs
  • CFOs
  • CTOs
  • COOs
  • Technology Managers
  • Compliance
  • Auditors
  • All Large Corporations
  • ISSA
  • ISACA
  • Association of Contingency Planners
  • Audit Associations
  • Internal Auditors Association
  • Continuity Planners
  • Business Continuity Planners
  • Disaster Recovery Continuity Planners
  • Risk Managers and Internal Auditor
Instructor Profile:
Michael C Redmond

Michael C Redmond
CEO and Lead Consultant, Redmond Worldwide

Dr. Michael C. Redmond, PhD is Consultant, Speaker and Author. Her certifications Include: MBCP, FBCI, PMP, CEM ISO 27001 Lead Implementer and Lead Auditor, as well as many other ISO certifications.

Michael also conducts ISO Certification Implementation and Audit Training for PECB. Michael is the Chapter President for Association of Contingency Planners Eastern Great Lake Chapter and an active member of ISSA.

She has consulted in the area of Cyber Security for clients in the arenas of Healthcare, Insurance, Financial and Manufacturing. Her projects have included:

  • SIEM Security information and event management which is Combining software products and services combining security information management (SIM) and security event management (SEM)
  • (CSIRT) which is Cyber Security Incident Response Programs, Plans, Playbooks, Training and Testing.
  • Audit of CSIRT programs and documentation
  • Information Security Programs and Implementation

Michael has consulted in the fields of Business Continuity and Disaster Recovery in the areas of Healthcare, Insurance, Financial, Manufacturing, Education and Government.

She has 3 published books; Mastering Your Introduction to Cyber Security, Mastering Business Continuity Management, Mastering Your Work Life Balance

Michael has a series of Audio Training that receive CEU’s from Disaster Recovery Institute (DRI) and other certifications.They are:

  • Cyber Security Training for - 6 CEU’s
  • Business Continuity Management for 20 CEU’s.

Michael’s been honored as Top Woman in her field at a White House Luncheon and was selected out of the world to write the prolog for the chapter on RISK Management by the United Nations for their Disaster Book which was given to the head of state for every UN member nation. She has recently been named on the list of “Women of Distinction for 2015” by Women of Distinction Magazine for her work in Cyber Security. She was selected to speak on Cyber Security Incident Response and SIEM at such recent conferences as:

  • International ISSA Conference in Chicago
  • NYS Cyber Security Conference – Co Spoke with Acting CISO for New York State
  • ISACA Western New York Conference
  • Metric Stream Round Table in New York City
Follow us :

 

 

Refund Policy

Our refund policy is governed by individual products and services refund policy mentioned against each of offerings. However in absence of specific refund policy of an offering below refund policy will be effective.
Registrants may cancel up to two working days prior to the course start date and will receive a letter of credit to be used towards a future course up to one year from date of issuance. ComplianceOnline would process/provide refund if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange. Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs. Substitutions can happen any time. On-Demand Recording purchases will not be refunded as it is available for immediate streaming. However if you are not able to view the webinar or you have any concern about the content of the webinar please contact us at below email or by call mentioning your feedback for resolution of the matter. We respect feedback/opinions of our customers which enables us to improve our products and services. To contact us please email [email protected] call +1-888-717-2436 (Toll Free).

 

 

+1-888-717-2436

6201 America Center Drive Suite 240, San Jose, CA 95002, USA

Follow Us

facebook twitter linkedin youtube

 

Copyright © 2023 ComplianceOnline.com MetricStream
Our Policies: Terms of use | Privacy

PAYMENT METHOD: 100% Secure Transaction

payment method