Risk-based Approach to IT Infrastructure Security & Control Assessments

Summary

During this 2-day course, participants will learn key information security controls, including a risk-based approach to design, operation and assessment of security and controls are critical to ensuring that an organization’s information assets are adequately protected to prevent compromise.

John G. Tannahill, CA, CISM, CGEIT, CRISC, will discuss a risk-based approach to assessment of security and control in the following areas:

  • Configuration Management Controls
  • Security Configuration Standards
  • Build Processes
  • Patch and Change Management Processes
  • Security Event Monitoring
  • Vulnerability Assessment & Management
  • Security Compliance Processes


Member – early $350, standard $400 Non-member – early $450, standard $550



Early Registration Deadline – April 7, 2017 Registration Deadline – April 15, 2017


Schedule of Events:

8:00am - 8:30am  Breakfast

8:30am - 12:00pm Training (15 minute break)

12:00pm - 1:00pm  Lunch

1:00pm - 4:30pm Training (15 minute break)


 CPE - 14 available




Details

  • When

  • Wednesday, April 19, 2017 - Thursday, April 20, 2017
    8:00 AM - 4:30 PM

  • Where

  • University of Phoenix
    2550 W. Union Hills Drive Ste 100
    Room 102-103
    Phoenix, Arizona 85027
    USA

  • Capacity

  • 40 (8 remaining)

Outlook Outlook
iCal iCal
Google Google
Yahoo! Yahoo!
MSN MSN
Top