Company: Pluralsight Author: Bobby Rogers Full Title: Information Security Manager: Information Security Program Management Year: 2018 Language: English Genre: Educational: Security Skill Level: Intermediate Price: - - Files: MP4 (+ Slides .PDF) Time: 04:11:45 Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 250 kbps Audio: AAC at 84 Kbps, 2 channels, 44.1 KHz Information security management ensures systems and data are protected. In this course, you'll learn how information security management directly protects data, in a balance of security, functionality, compliance, and competing resources. Protecting information assets is the primary goal of an information security program, and information security management provides the oversight for the balance between resources, compliance, and security. Organizations must protect their information assets by establishing and maintaining an effective information security program, considering the organization’s mission, goals, infrastructure, and people. In this course, Information Security Manager: Information Security Program Management, you'll gain solid foundational knowledge on the program management aspect of security, as well as skills you can use to effectively protect assets in your organization. First, you'll learn how to develop internal governance, such as security policies, manage people and technology processes, and how to maintain an information security training program. Next, you'll explore how to audit third-party agreements and contracts. Finally, you'll discover how to monitor the performance of the information security program and report that information to the various stakeholders in the organization. By the end of this course, you'll be well-versed in information security program management and how it affects the organization’s information security assets. Lessons: 1. Course Overview 01. Course Overview 2. Integrating Security into Organizational Functions 02. Organizational Strategy and Information Security 03. Organizational Business Processes and Functions 04. Information Security Requirements and Processes 05. Relationships Between Information Security and Business Functions 06. Integrating Information Security Requirements into Business Processes 07. Organizational Characteristics of Globomantics 08. Summary 3. Managing Security Resources 09. Managing Security Resources 10. Security Resources and Budget 11. Security Resources Reporting 12. Security Budget at Globomantics 13. Managing Security Requirements 14. Security Requirements at Globomantics 15. Employing Resources Against Requirements 16. Considering Emerging Technologies 17. Considerations with Implementing Current or New Technologies at Globomantics 18. Summary 4. Managing Information Security Processes 19. Understanding Information Security Processes 20. Personnel Processes: Part 1 21. Personnel Processes: Part 2 22. Technology Processes 23. Management Processes 24. Controls Processes 25. Testing Control Effectiveness 26. Summary 5. Developing and Maintaining Internal Governance 27. Understanding Internal Security Governance 28. Employing Security Standards and Frameworks 29. Developing and Implementing Security Policies 30. Implementing Procedures, Standards, and Guidelines 31. Communicating Internal Security Governance 32. Security Governance at Globomantics 33. Summary 6. Implementing the Information Security Training Program 34. Implementing the Information Security Training Program 35. Security Staff Training 36. Roles and Responsibilites 37. Governance Requirements for Training 38. Summary 7. Engaging with Third Parties 39. Third Party Considerations 40. Third Party Considerations at Globomantics 41. Managed Services 42. Contract and Third party Compliance 43. Third Party Compliance at Globomantics 44. Summary 8. Providing Security Metrics 45. Defining Security Metrics 46. Security Metrics at Globomantics 47. Developing and Using KPIs 48. Developing and Using KPIs at Globomantics 49. Developing and Using KRIs 50. Developing and Using KRIs at Globomantics 51. Developing and Using KGIs 52. Developing and Using KGIs at Globomantics 53. Using Security Metrics to Determine Security Program Effectiveness 54. Summary 9. Reporting Security to Stakeholders 55. Understanding Organizational Stakeholders 56. Stakeholders at Globomantics 57. Understanding Stakeholder Information Needs 58. Understanding Stakeholder Information Needs at Globomantics 59. Organizational Communication Channels 60. Communicating Information Security 61. Communicating Information Security at Globomantics 62. Monitoring Information Security Performance 63. Getting Stakeholder Committment to Information Security 64. Obtaining Committment to Information Security at Globomantics 65. Summary Our members see more. Join us! ------------- Our members see more. Join us!