SlideShare ist ein Scribd-Unternehmen logo
1 von 19
IT Governance and Information System
Security Management
Global Opportunities and Career Prospects
PRESENTED BY CSSRL ACCREDITED EXTENSION CENTER PUNE
What is IT Security ?
• IT Security is the body of technologies, processes and practices designed to protect
networks, computers, programs and data from attack, damage or unauthorized access.
In a computing context, the term security implies cyber security.
• Its all about maintaining Information CONFIDENTIALITY, INTEGRITY & AVAILABILITY
• An Industry that is currently strengthening Parent and Associated Business Backbone
of every Commercial or Non-Commercial Enterprise Setup.
What is IT Security ?
Information
Security
C
Confidentiality
A
Availability
I
Integrity
Assurance that the information is
accessible only to those authorized
to have access
Confidentiality breaches may occur
due to improper data handling or a
hacking attempt
The trustworthiness of data
or resources in terms of
preventing improper and
unauthorized changes
Assurance that information
can be relied upon to be
sufficiently accurate for its
purpose
Assurance that the systems
responsible for delivering,
storing, and processing
information are accessible when
required by the authorized users
Why IT Security?
The increasing number of security breaches has led to increasing information
security concerns among organizations worldwide.
Organizations and their information systems and networks are exposed with
SECURITY THREATS such as fraud, espionage, fire, flood and sabotage from a
wide range of sources.
What is IT Governance?
• IT Governance or Information Security Management Systems (ISMS) is a systematic and
structured approach to managing information so that it remains secure.
• ISMS implementation includes policies, processes, procedures, organizational structures
and software and hardware functions.
• ISMS implementation carries organization’s objectives, security requirements, processes
employed, size and structure.
Why IT Governance?
• 100% Secured Business Process Model is IMPOSSIBLE though every Organization aspires for it.
• Thus there is a need to look at information security from a HOLISTIC PERSPECTIVE , and to have an
information security management methodology to protect information systematically. This is where the
need for ISMS comes in.
• ACHIEVING INFORMATION SECURITY is a huge challenge for organization as it CANNOT BE
ACHIEVED THROUGH TECHNOLOGICAL MEANS ALONE.
Why IT Governance?
Information
Security
Management
System
Structured Management of Information System
Conformity with Best Security Practices
Major Prevention against Data Protection Issues
Global Positioning and Reputation
Reduction in Cost against Information Loss
Improved Returns on Security Investment
Global Standardization
Reliable Service Model for End users and Clients-Customers
And More…
Threats
Legislation
Identity Mgmt Assurance
Controls
Business
Impacts
Assets
Organization
Information System
exposing To a loss of
causing
causing
which are mitigated by
which requirecausing
exploit +
which protect against
reduce
+
+
Vulnerabilities
Confidentiality
Integrity
Availability
Typical Business Security Cycle
Cycle Begins
Who needs IT Governance ?
SOFTWARE
DEVELOPMENT FIRMS
BANKING
(ONLINE-REGULAR)
TELECOMMUNICATION
INDUSTRY
GOVERNMENT
INFORMATION CENTERS
ATOMIC POWER HOUSES MEDIA
EDUCATIONAL
INSTITUTIONS
ONLINE RETAIL INDUSTRY IT SERVICE INDUSTRY
DEFENCE INSTITUTIONS
AND FIRMS
STOCK MARKET SOCIAL MEDIA
WEB DEVELOPMENT
INDUSTRY
HEALTH CARE INDUSTRY
WEATHER FORCASTING
SECTOR
HOSPITALITY INDUSTRY AUTOMATION INDUSTRY
AND EVERY INDUSTRY THAT
RELIES UPON
IT BACKBONE
Career in IT Governance
Currently as almost every Commercial Non-Commercial Enterprise Setup relies upon IT backbone.
EVERY INDUSTRY REQUIRES IT SECURITY MANAGERS’ WORKFORCE to ensure Robust Security
Governance.
Chief Information Security Manager
Security Auditor
Security Architect
Regulatory Compliance Manager
ISO 27001 Lead Auditor
ISO 27001 Lead Implementer
Security Operations Manager
Network Manager
Security Analyst
Risk Analyst
Risk Assessment Manager
Security Consultant
And More than 15 Career Profile
Career in IT Governance
How to Get in ?
• More than 67% of IT Security Professionals Across World are
Commerce or Non-IT Graduates. Thus simply EARN ELIGIBILITY.Graduation
• EARN SKILLS AND HANDS ON EXPERIENCE through
Professional Training strictly aligned with Industrial Trends and
Standards
Industrial Training
• Get your Skills Globally Certified with ISACA, ISC2, BSI, PCI,
Axelos and other International Certification Bodies. EARN
CREDITABILITY
Global Certification
• IT Security Management Industry favors Experienced Management
Professionals for Top Recruitments. Thus EARN IT SECURITY
ASSOCIATED DOMAIN EXPERIENCE.
Work Experience
• Your Industrial worth at Globe is over 70000$ ANNUALLY now.Ready to Hit Opportunity
How can we help you ?
Who we are?
Cyber Security Studies and Research Laboratory, also
popular as CSSRL can be well defined as
an IT Security Company incorporated under 1956
Company Act, Ministry of Corporate Affairs, GOI
Offering a Spectrum of more than 17 State-of-Art
Professional and Intellectual Services, CSSRL is
motivated by its rich ethics commitments for
disseminating Cyber Security Professional Training
and improvising best of IT Security Practices and
Standards across variegated Critical Information
Systems.
CSSRL operations span THREE MAJOR BUSINESS
VERTICALS
1. Education and Training Services
2. Business Services (Security Services)
3. Franchising Services
• More than 67% of IT Security Professionals Across World are
Commerce or Non-IT Graduates. Thus simply EARN ELIGIBILITY.Graduation
• EARN SKILLS AND HANDS ON EXPERIENCE through
Professional Training strictly aligned with Industrial Trends and
Standards
Industrial Training
• Get your Skills Globally Certified with ISACA, ISC2, BSI, PCI,
Axelos and other International Certification Bodies. EARN
CREDITABILITY
Global Certification
• IT Security Management Industry favors Experienced Management
Professionals for Top Recruitments. Thus EARN IT SECURITY
ASSOCIATED DOMAIN EXPERIENCE.
Work Experience
• Your Industrial worth at Globe is over 70000$ ANNUALLY now.
Ready to Hit
Opportunity
Bridging the Gap
CSSRL Pedagogy Highlights
CSSRL carries Training on More than 17 Domains of
IT Security out of which following areas generates
Trained Security Managers:
• IT System Security Management
• Corporate Security Modeling
• ISO 27001 Lead Audit
• Business Continuity
• Policy-Procedure Development
• Risk Assessment and Analysis
• Risk Mitigation and Controls
CSSRL introduces Certification in IT Governance (CITG) as
Foundation Program in IT System Security Management.
Certification in IT Governance (CITG)
• CITG V1.0 or Certification in IT Governance is a
highly professional certification to assist IT Experts
and Organizations align IT Framework and Security
Model with Structured Business Strategies to ensure
continuity of Business Operations without breach into
Critical Information Systems. Accredited with
IADL(UK), CITG sets a globally recognized
International Credit-based Certification in Information
Security Management Systems.
• CITG V1.0 furthers this training by offering Industrial
Training for International Certifications like CISA,
CISM , ISO 27001 etc
• CITG V1.0 also carries optional opportunity for IT
Security Management Internship that fulfills Work
Experience Requirement to fetch Best place in
Industry.
Any Question ?
Contact Us @
CSSRL AEC, Near Dena Bank, Opposite
Dominos Pizza,Sanapati Bapat Road, Pune-
411016
http://pune.cssrl.in/
09820378258 / 02041217411
pune@cssrl.in
https://www.facebook.com/cssrlpune
https://in.linkedin.com/in/cssrlpune
https://twitter.com/cssrl_pune

Weitere ähnliche Inhalte

Was ist angesagt?

NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
Top management role to implement ISO 27001
Top management role to implement ISO 27001Top management role to implement ISO 27001
Top management role to implement ISO 27001PECB
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEryk Budi Pratama
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsKarthikeyan Dhayalan
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkTuan Phan
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfParishSummer
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfControlCase
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 

Was ist angesagt? (20)

NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Top management role to implement ISO 27001
Top management role to implement ISO 27001Top management role to implement ISO 27001
Top management role to implement ISO 27001
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 

Andere mochten auch

Information Systems Governance
Information Systems GovernanceInformation Systems Governance
Information Systems GovernanceMark Roman
 
Hp Bto Bsa
Hp Bto BsaHp Bto Bsa
Hp Bto Bsajohnej99
 
Theater revenue
Theater revenueTheater revenue
Theater revenueSara Hicks
 
Essential reporting for capacity and performance management webinar 11 18
Essential reporting for capacity and performance management webinar 11 18Essential reporting for capacity and performance management webinar 11 18
Essential reporting for capacity and performance management webinar 11 18Metron
 
HP Software - The Bto Solution
HP Software - The Bto SolutionHP Software - The Bto Solution
HP Software - The Bto SolutionHPDutchWorld
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionCapgemini
 
Cobit 5 for information security
Cobit 5 for information securityCobit 5 for information security
Cobit 5 for information securityElkanouni Mohamed
 
Resource mgmt capacity to planning to reporting actuals - Oracle Primavera Co...
Resource mgmt capacity to planning to reporting actuals - Oracle Primavera Co...Resource mgmt capacity to planning to reporting actuals - Oracle Primavera Co...
Resource mgmt capacity to planning to reporting actuals - Oracle Primavera Co...p6academy
 
The Value of Data for Digital Business Models
The Value of Data for Digital Business ModelsThe Value of Data for Digital Business Models
The Value of Data for Digital Business ModelsBoris Otto
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
 
La Gouvernance des Données
La Gouvernance des DonnéesLa Gouvernance des Données
La Gouvernance des DonnéesSoft Computing
 
Ngen oss bss - architecture evolution
Ngen oss bss - architecture evolution Ngen oss bss - architecture evolution
Ngen oss bss - architecture evolution Grazio Panico
 
Information system development
Information system development Information system development
Information system development Sanoob Sidiq
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
Understanding IT Governance and Risk Management
Understanding IT Governance and Risk ManagementUnderstanding IT Governance and Risk Management
Understanding IT Governance and Risk Managementjiricejka
 

Andere mochten auch (19)

Information Systems Governance
Information Systems GovernanceInformation Systems Governance
Information Systems Governance
 
IT Security & Governance Template
IT Security & Governance TemplateIT Security & Governance Template
IT Security & Governance Template
 
C-Sec Pro
C-Sec Pro C-Sec Pro
C-Sec Pro
 
Hp Bto Bsa
Hp Bto BsaHp Bto Bsa
Hp Bto Bsa
 
Theater revenue
Theater revenueTheater revenue
Theater revenue
 
Essential reporting for capacity and performance management webinar 11 18
Essential reporting for capacity and performance management webinar 11 18Essential reporting for capacity and performance management webinar 11 18
Essential reporting for capacity and performance management webinar 11 18
 
HP Software - The Bto Solution
HP Software - The Bto SolutionHP Software - The Bto Solution
HP Software - The Bto Solution
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer Satisfaction
 
Network security
Network securityNetwork security
Network security
 
Cobit 5 for information security
Cobit 5 for information securityCobit 5 for information security
Cobit 5 for information security
 
Resource mgmt capacity to planning to reporting actuals - Oracle Primavera Co...
Resource mgmt capacity to planning to reporting actuals - Oracle Primavera Co...Resource mgmt capacity to planning to reporting actuals - Oracle Primavera Co...
Resource mgmt capacity to planning to reporting actuals - Oracle Primavera Co...
 
The Value of Data for Digital Business Models
The Value of Data for Digital Business ModelsThe Value of Data for Digital Business Models
The Value of Data for Digital Business Models
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
La Gouvernance des Données
La Gouvernance des DonnéesLa Gouvernance des Données
La Gouvernance des Données
 
Ngen oss bss - architecture evolution
Ngen oss bss - architecture evolution Ngen oss bss - architecture evolution
Ngen oss bss - architecture evolution
 
Information system development
Information system development Information system development
Information system development
 
Capacity Management
Capacity ManagementCapacity Management
Capacity Management
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Understanding IT Governance and Risk Management
Understanding IT Governance and Risk ManagementUnderstanding IT Governance and Risk Management
Understanding IT Governance and Risk Management
 

Ähnlich wie IT governance and Information System Security

Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationSyed Azher
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSOSagarNegi10
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOSagarNegi10
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service ProposalCarl Bradley Pate
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxinfosec train
 
SpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptxSpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptxmayanksingh818
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA
 
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCHow Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCITpreneurs
 
Enroll in our Certified Cyber Security Courses in Dubai
Enroll in our Certified Cyber Security Courses in DubaiEnroll in our Certified Cyber Security Courses in Dubai
Enroll in our Certified Cyber Security Courses in Dubaitraininginstitutelau
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions
 
SECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security CompanySECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security Companykeshavsecurium
 

Ähnlich wie IT governance and Information System Security (20)

Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
 
SpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptxSpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptx
 
Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance Partner
 
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCHow Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
 
Information security
Information securityInformation security
Information security
 
Enroll in our Certified Cyber Security Courses in Dubai
Enroll in our Certified Cyber Security Courses in DubaiEnroll in our Certified Cyber Security Courses in Dubai
Enroll in our Certified Cyber Security Courses in Dubai
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
 
Securim Solutions Pvt Ltd
Securim Solutions Pvt LtdSecurim Solutions Pvt Ltd
Securim Solutions Pvt Ltd
 
SECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security CompanySECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security Company
 

Kürzlich hochgeladen

Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607dollysharma2066
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girladitipandeya
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementTulsiDhidhi1
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic managementharfimakarim
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 

Kürzlich hochgeladen (20)

Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg PartnershipUnlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
 
LoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner CircleLoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner Circle
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
Peak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian DugmorePeak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian Dugmore
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
 
Disrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdfDisrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdf
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 
Empowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdfEmpowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdf
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing management
 
Discover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdfDiscover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdf
 
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote SpeakerLeadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
 
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdfImagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic management
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 

IT governance and Information System Security

  • 1. IT Governance and Information System Security Management Global Opportunities and Career Prospects PRESENTED BY CSSRL ACCREDITED EXTENSION CENTER PUNE
  • 2. What is IT Security ? • IT Security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber security. • Its all about maintaining Information CONFIDENTIALITY, INTEGRITY & AVAILABILITY • An Industry that is currently strengthening Parent and Associated Business Backbone of every Commercial or Non-Commercial Enterprise Setup.
  • 3. What is IT Security ? Information Security C Confidentiality A Availability I Integrity Assurance that the information is accessible only to those authorized to have access Confidentiality breaches may occur due to improper data handling or a hacking attempt The trustworthiness of data or resources in terms of preventing improper and unauthorized changes Assurance that information can be relied upon to be sufficiently accurate for its purpose Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users
  • 4. Why IT Security? The increasing number of security breaches has led to increasing information security concerns among organizations worldwide. Organizations and their information systems and networks are exposed with SECURITY THREATS such as fraud, espionage, fire, flood and sabotage from a wide range of sources.
  • 5. What is IT Governance? • IT Governance or Information Security Management Systems (ISMS) is a systematic and structured approach to managing information so that it remains secure. • ISMS implementation includes policies, processes, procedures, organizational structures and software and hardware functions. • ISMS implementation carries organization’s objectives, security requirements, processes employed, size and structure.
  • 6. Why IT Governance? • 100% Secured Business Process Model is IMPOSSIBLE though every Organization aspires for it. • Thus there is a need to look at information security from a HOLISTIC PERSPECTIVE , and to have an information security management methodology to protect information systematically. This is where the need for ISMS comes in. • ACHIEVING INFORMATION SECURITY is a huge challenge for organization as it CANNOT BE ACHIEVED THROUGH TECHNOLOGICAL MEANS ALONE.
  • 7. Why IT Governance? Information Security Management System Structured Management of Information System Conformity with Best Security Practices Major Prevention against Data Protection Issues Global Positioning and Reputation Reduction in Cost against Information Loss Improved Returns on Security Investment Global Standardization Reliable Service Model for End users and Clients-Customers And More…
  • 8. Threats Legislation Identity Mgmt Assurance Controls Business Impacts Assets Organization Information System exposing To a loss of causing causing which are mitigated by which requirecausing exploit + which protect against reduce + + Vulnerabilities Confidentiality Integrity Availability Typical Business Security Cycle Cycle Begins
  • 9. Who needs IT Governance ? SOFTWARE DEVELOPMENT FIRMS BANKING (ONLINE-REGULAR) TELECOMMUNICATION INDUSTRY GOVERNMENT INFORMATION CENTERS ATOMIC POWER HOUSES MEDIA EDUCATIONAL INSTITUTIONS ONLINE RETAIL INDUSTRY IT SERVICE INDUSTRY DEFENCE INSTITUTIONS AND FIRMS STOCK MARKET SOCIAL MEDIA WEB DEVELOPMENT INDUSTRY HEALTH CARE INDUSTRY WEATHER FORCASTING SECTOR HOSPITALITY INDUSTRY AUTOMATION INDUSTRY AND EVERY INDUSTRY THAT RELIES UPON IT BACKBONE
  • 10. Career in IT Governance Currently as almost every Commercial Non-Commercial Enterprise Setup relies upon IT backbone. EVERY INDUSTRY REQUIRES IT SECURITY MANAGERS’ WORKFORCE to ensure Robust Security Governance. Chief Information Security Manager Security Auditor Security Architect Regulatory Compliance Manager ISO 27001 Lead Auditor ISO 27001 Lead Implementer Security Operations Manager Network Manager Security Analyst Risk Analyst Risk Assessment Manager Security Consultant And More than 15 Career Profile
  • 11. Career in IT Governance
  • 12. How to Get in ? • More than 67% of IT Security Professionals Across World are Commerce or Non-IT Graduates. Thus simply EARN ELIGIBILITY.Graduation • EARN SKILLS AND HANDS ON EXPERIENCE through Professional Training strictly aligned with Industrial Trends and Standards Industrial Training • Get your Skills Globally Certified with ISACA, ISC2, BSI, PCI, Axelos and other International Certification Bodies. EARN CREDITABILITY Global Certification • IT Security Management Industry favors Experienced Management Professionals for Top Recruitments. Thus EARN IT SECURITY ASSOCIATED DOMAIN EXPERIENCE. Work Experience • Your Industrial worth at Globe is over 70000$ ANNUALLY now.Ready to Hit Opportunity
  • 13. How can we help you ?
  • 14. Who we are? Cyber Security Studies and Research Laboratory, also popular as CSSRL can be well defined as an IT Security Company incorporated under 1956 Company Act, Ministry of Corporate Affairs, GOI Offering a Spectrum of more than 17 State-of-Art Professional and Intellectual Services, CSSRL is motivated by its rich ethics commitments for disseminating Cyber Security Professional Training and improvising best of IT Security Practices and Standards across variegated Critical Information Systems. CSSRL operations span THREE MAJOR BUSINESS VERTICALS 1. Education and Training Services 2. Business Services (Security Services) 3. Franchising Services
  • 15. • More than 67% of IT Security Professionals Across World are Commerce or Non-IT Graduates. Thus simply EARN ELIGIBILITY.Graduation • EARN SKILLS AND HANDS ON EXPERIENCE through Professional Training strictly aligned with Industrial Trends and Standards Industrial Training • Get your Skills Globally Certified with ISACA, ISC2, BSI, PCI, Axelos and other International Certification Bodies. EARN CREDITABILITY Global Certification • IT Security Management Industry favors Experienced Management Professionals for Top Recruitments. Thus EARN IT SECURITY ASSOCIATED DOMAIN EXPERIENCE. Work Experience • Your Industrial worth at Globe is over 70000$ ANNUALLY now. Ready to Hit Opportunity Bridging the Gap
  • 16. CSSRL Pedagogy Highlights CSSRL carries Training on More than 17 Domains of IT Security out of which following areas generates Trained Security Managers: • IT System Security Management • Corporate Security Modeling • ISO 27001 Lead Audit • Business Continuity • Policy-Procedure Development • Risk Assessment and Analysis • Risk Mitigation and Controls CSSRL introduces Certification in IT Governance (CITG) as Foundation Program in IT System Security Management.
  • 17. Certification in IT Governance (CITG) • CITG V1.0 or Certification in IT Governance is a highly professional certification to assist IT Experts and Organizations align IT Framework and Security Model with Structured Business Strategies to ensure continuity of Business Operations without breach into Critical Information Systems. Accredited with IADL(UK), CITG sets a globally recognized International Credit-based Certification in Information Security Management Systems. • CITG V1.0 furthers this training by offering Industrial Training for International Certifications like CISA, CISM , ISO 27001 etc • CITG V1.0 also carries optional opportunity for IT Security Management Internship that fulfills Work Experience Requirement to fetch Best place in Industry.
  • 19. Contact Us @ CSSRL AEC, Near Dena Bank, Opposite Dominos Pizza,Sanapati Bapat Road, Pune- 411016 http://pune.cssrl.in/ 09820378258 / 02041217411 pune@cssrl.in https://www.facebook.com/cssrlpune https://in.linkedin.com/in/cssrlpune https://twitter.com/cssrl_pune