CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
IT governance and Information System Security
1. IT Governance and Information System
Security Management
Global Opportunities and Career Prospects
PRESENTED BY CSSRL ACCREDITED EXTENSION CENTER PUNE
2. What is IT Security ?
• IT Security is the body of technologies, processes and practices designed to protect
networks, computers, programs and data from attack, damage or unauthorized access.
In a computing context, the term security implies cyber security.
• Its all about maintaining Information CONFIDENTIALITY, INTEGRITY & AVAILABILITY
• An Industry that is currently strengthening Parent and Associated Business Backbone
of every Commercial or Non-Commercial Enterprise Setup.
3. What is IT Security ?
Information
Security
C
Confidentiality
A
Availability
I
Integrity
Assurance that the information is
accessible only to those authorized
to have access
Confidentiality breaches may occur
due to improper data handling or a
hacking attempt
The trustworthiness of data
or resources in terms of
preventing improper and
unauthorized changes
Assurance that information
can be relied upon to be
sufficiently accurate for its
purpose
Assurance that the systems
responsible for delivering,
storing, and processing
information are accessible when
required by the authorized users
4. Why IT Security?
The increasing number of security breaches has led to increasing information
security concerns among organizations worldwide.
Organizations and their information systems and networks are exposed with
SECURITY THREATS such as fraud, espionage, fire, flood and sabotage from a
wide range of sources.
5. What is IT Governance?
• IT Governance or Information Security Management Systems (ISMS) is a systematic and
structured approach to managing information so that it remains secure.
• ISMS implementation includes policies, processes, procedures, organizational structures
and software and hardware functions.
• ISMS implementation carries organization’s objectives, security requirements, processes
employed, size and structure.
6. Why IT Governance?
• 100% Secured Business Process Model is IMPOSSIBLE though every Organization aspires for it.
• Thus there is a need to look at information security from a HOLISTIC PERSPECTIVE , and to have an
information security management methodology to protect information systematically. This is where the
need for ISMS comes in.
• ACHIEVING INFORMATION SECURITY is a huge challenge for organization as it CANNOT BE
ACHIEVED THROUGH TECHNOLOGICAL MEANS ALONE.
7. Why IT Governance?
Information
Security
Management
System
Structured Management of Information System
Conformity with Best Security Practices
Major Prevention against Data Protection Issues
Global Positioning and Reputation
Reduction in Cost against Information Loss
Improved Returns on Security Investment
Global Standardization
Reliable Service Model for End users and Clients-Customers
And More…
9. Who needs IT Governance ?
SOFTWARE
DEVELOPMENT FIRMS
BANKING
(ONLINE-REGULAR)
TELECOMMUNICATION
INDUSTRY
GOVERNMENT
INFORMATION CENTERS
ATOMIC POWER HOUSES MEDIA
EDUCATIONAL
INSTITUTIONS
ONLINE RETAIL INDUSTRY IT SERVICE INDUSTRY
DEFENCE INSTITUTIONS
AND FIRMS
STOCK MARKET SOCIAL MEDIA
WEB DEVELOPMENT
INDUSTRY
HEALTH CARE INDUSTRY
WEATHER FORCASTING
SECTOR
HOSPITALITY INDUSTRY AUTOMATION INDUSTRY
AND EVERY INDUSTRY THAT
RELIES UPON
IT BACKBONE
10. Career in IT Governance
Currently as almost every Commercial Non-Commercial Enterprise Setup relies upon IT backbone.
EVERY INDUSTRY REQUIRES IT SECURITY MANAGERS’ WORKFORCE to ensure Robust Security
Governance.
Chief Information Security Manager
Security Auditor
Security Architect
Regulatory Compliance Manager
ISO 27001 Lead Auditor
ISO 27001 Lead Implementer
Security Operations Manager
Network Manager
Security Analyst
Risk Analyst
Risk Assessment Manager
Security Consultant
And More than 15 Career Profile
12. How to Get in ?
• More than 67% of IT Security Professionals Across World are
Commerce or Non-IT Graduates. Thus simply EARN ELIGIBILITY.Graduation
• EARN SKILLS AND HANDS ON EXPERIENCE through
Professional Training strictly aligned with Industrial Trends and
Standards
Industrial Training
• Get your Skills Globally Certified with ISACA, ISC2, BSI, PCI,
Axelos and other International Certification Bodies. EARN
CREDITABILITY
Global Certification
• IT Security Management Industry favors Experienced Management
Professionals for Top Recruitments. Thus EARN IT SECURITY
ASSOCIATED DOMAIN EXPERIENCE.
Work Experience
• Your Industrial worth at Globe is over 70000$ ANNUALLY now.Ready to Hit Opportunity
14. Who we are?
Cyber Security Studies and Research Laboratory, also
popular as CSSRL can be well defined as
an IT Security Company incorporated under 1956
Company Act, Ministry of Corporate Affairs, GOI
Offering a Spectrum of more than 17 State-of-Art
Professional and Intellectual Services, CSSRL is
motivated by its rich ethics commitments for
disseminating Cyber Security Professional Training
and improvising best of IT Security Practices and
Standards across variegated Critical Information
Systems.
CSSRL operations span THREE MAJOR BUSINESS
VERTICALS
1. Education and Training Services
2. Business Services (Security Services)
3. Franchising Services
15. • More than 67% of IT Security Professionals Across World are
Commerce or Non-IT Graduates. Thus simply EARN ELIGIBILITY.Graduation
• EARN SKILLS AND HANDS ON EXPERIENCE through
Professional Training strictly aligned with Industrial Trends and
Standards
Industrial Training
• Get your Skills Globally Certified with ISACA, ISC2, BSI, PCI,
Axelos and other International Certification Bodies. EARN
CREDITABILITY
Global Certification
• IT Security Management Industry favors Experienced Management
Professionals for Top Recruitments. Thus EARN IT SECURITY
ASSOCIATED DOMAIN EXPERIENCE.
Work Experience
• Your Industrial worth at Globe is over 70000$ ANNUALLY now.
Ready to Hit
Opportunity
Bridging the Gap
16. CSSRL Pedagogy Highlights
CSSRL carries Training on More than 17 Domains of
IT Security out of which following areas generates
Trained Security Managers:
• IT System Security Management
• Corporate Security Modeling
• ISO 27001 Lead Audit
• Business Continuity
• Policy-Procedure Development
• Risk Assessment and Analysis
• Risk Mitigation and Controls
CSSRL introduces Certification in IT Governance (CITG) as
Foundation Program in IT System Security Management.
17. Certification in IT Governance (CITG)
• CITG V1.0 or Certification in IT Governance is a
highly professional certification to assist IT Experts
and Organizations align IT Framework and Security
Model with Structured Business Strategies to ensure
continuity of Business Operations without breach into
Critical Information Systems. Accredited with
IADL(UK), CITG sets a globally recognized
International Credit-based Certification in Information
Security Management Systems.
• CITG V1.0 furthers this training by offering Industrial
Training for International Certifications like CISA,
CISM , ISO 27001 etc
• CITG V1.0 also carries optional opportunity for IT
Security Management Internship that fulfills Work
Experience Requirement to fetch Best place in
Industry.