PLU | Information Security Manager: Information Security Program Management (2018 EN)

Discussion in 'Information Technology' started by Kanka, Jul 21, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,047
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Bobby Rogers
    Full Title: Information Security Manager: Information Security Program Management
    Year: 2018
    Language: English
    Genre: Educational: Security
    Skill Level: Intermediate
    Price: -
    -
    Files: MP4 (+ Slides .PDF)
    Time: 04:11:45
    Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 250 kbps
    Audio: AAC at 84 Kbps, 2 channels, 44.1 KHz



    Information security management ensures systems and data are protected. In this course, you'll learn how information security management directly protects data, in a balance of security, functionality, compliance, and competing resources.

    Protecting information assets is the primary goal of an information security program, and information security management provides the oversight for the balance between resources, compliance, and security. Organizations must protect their information assets by establishing and maintaining an effective information security program, considering the organization’s mission, goals, infrastructure, and people. In this course, Information Security Manager: Information Security Program Management, you'll gain solid foundational knowledge on the program management aspect of security, as well as skills you can use to effectively protect assets in your organization. First, you'll learn how to develop internal governance, such as security policies, manage people and technology processes, and how to maintain an information security training program. Next, you'll explore how to audit third-party agreements and contracts. Finally, you'll discover how to monitor the performance of the information security program and report that information to the various stakeholders in the organization. By the end of this course, you'll be well-versed in information security program management and how it affects the organization’s information security assets.


    Lessons:
    1. Course Overview
    01. Course Overview

    2. Integrating Security into Organizational Functions
    02. Organizational Strategy and Information Security
    03. Organizational Business Processes and Functions
    04. Information Security Requirements and Processes
    05. Relationships Between Information Security and Business Functions
    06. Integrating Information Security Requirements into Business Processes
    07. Organizational Characteristics of Globomantics
    08. Summary

    3. Managing Security Resources
    09. Managing Security Resources
    10. Security Resources and Budget
    11. Security Resources Reporting
    12. Security Budget at Globomantics
    13. Managing Security Requirements
    14. Security Requirements at Globomantics
    15. Employing Resources Against Requirements
    16. Considering Emerging Technologies
    17. Considerations with Implementing Current or New Technologies at Globomantics
    18. Summary

    4. Managing Information Security Processes
    19. Understanding Information Security Processes
    20. Personnel Processes: Part 1
    21. Personnel Processes: Part 2
    22. Technology Processes
    23. Management Processes
    24. Controls Processes
    25. Testing Control Effectiveness
    26. Summary

    5. Developing and Maintaining Internal Governance
    27. Understanding Internal Security Governance
    28. Employing Security Standards and Frameworks
    29. Developing and Implementing Security Policies
    30. Implementing Procedures, Standards, and Guidelines
    31. Communicating Internal Security Governance
    32. Security Governance at Globomantics
    33. Summary

    6. Implementing the Information Security Training Program
    34. Implementing the Information Security Training Program
    35. Security Staff Training
    36. Roles and Responsibilites
    37. Governance Requirements for Training
    38. Summary

    7. Engaging with Third Parties
    39. Third Party Considerations
    40. Third Party Considerations at Globomantics
    41. Managed Services
    42. Contract and Third party Compliance
    43. Third Party Compliance at Globomantics
    44. Summary

    8. Providing Security Metrics
    45. Defining Security Metrics
    46. Security Metrics at Globomantics
    47. Developing and Using KPIs
    48. Developing and Using KPIs at Globomantics
    49. Developing and Using KRIs
    50. Developing and Using KRIs at Globomantics
    51. Developing and Using KGIs
    52. Developing and Using KGIs at Globomantics
    53. Using Security Metrics to Determine Security Program Effectiveness
    54. Summary

    9. Reporting Security to Stakeholders
    55. Understanding Organizational Stakeholders
    56. Stakeholders at Globomantics
    57. Understanding Stakeholder Information Needs
    58. Understanding Stakeholder Information Needs at Globomantics
    59. Organizational Communication Channels
    60. Communicating Information Security
    61. Communicating Information Security at Globomantics
    62. Monitoring Information Security Performance
    63. Getting Stakeholder Committment to Information Security
    64. Obtaining Committment to Information Security at Globomantics
    65. Summary



    -------------
     
    Last edited: Jul 21, 2019