To manage information security in a company, you need self auditing of your cyber security program.
This webinar will cover how to audit your program in relation to establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system.
In addition we will discuss which standards to reference to effectively ensure your organization has a robust security program for vital information assets.
Protecting an organization's information is critical for the successful management and smooth operation.
A good self Audit program not only helps to keep your confidential information secure but also provides customers and stakeholders with confidence in your risk management system while ensuring you are meeting legal obligations.
Why should you Attend
Attend this session by our expert speaker, Dr. Michael C. Redmond, and learn to audit ISO 27001 and Information/Cyber Security.
Michael will help your organization to manage the security of the assets such as intellectual property, financial information, employee details entrusted to you by third parties through an effective auditing program that audits controls associated with the ISO 27001 standard.
This session will enable you to gain knowledge and better audit information security management.
On attending this webinar, you will receive valuable information that you can implement. This is a must in the new world that is facing new Information/Cyber risks every year.
Areas Covered in the Session
- Risk assessment
- Security policy
- Organization of information security
- Asset management
- Human resources security
- Physical and environmental security
- Communications and operations management
- Access control
- Information systems acquisition, development, and maintenance
- Information security incident management
- Business continuity management
- Ways to audit your information security management system
- Implementation tips on how long does it take to use tools
- Important benefits and ways to present them to management
- Auditing in your organization
- ISMS implementation framework
- Key elements of ISO 27001
- Get an overview of the audit implementation strategy
Who Will Benefit
- Security Planners
- Technology Managers
- All Large Corporations
- Association of Contingency Planners
- Audit Associations
- Internal Auditors Association
- Continuity Planners
- Business Continuity Planners
- Disaster Recovery Continuity Planners
- Risk Managers
- Internal Auditors
Ms. Michael Redmond She is a Consultant, Speaker and Author. She also conducts ISO Certification Training for PECB. Michael is the Chapter President for Association of Contingency Planners Eastern Great Lake Chapter and an active member of ISSA.
Michael is certified as a Lead Implementer in ISO 27001 Information Security Management, ISO 27035 Security Incident Response, ISO 22301 Business Continuity Management and ISO 21500 Project Management. She is a Certified Instructor for ISO Certification Courses through PECB. Also certified Project Manager PMP, and 2 Master Certifications (MBCP) (FBCI) in Disaster Recovery and CEM Emergency Management
She has consulted in the area of Cyber Security for clients in the arenas of Healthcare, Insurance, Financial and Manufacturing. Her projects have included:
SIEM Security information and event management which is Combining software products and services combining security information management (SIM) and security event management (SEM)
(CSIRT) which is Cyber Security Incident Response Programs, Plans, Playbooks, Training and Testing.
Audit of CSIRT programs and documentation
Information Security Programs and Implementation
She has 2 books which are coming out in 2016 and are being published by one of the Top International Publishers in the world. The first is a Cyber Security book and the second is a Business Continuity and Disaster Recovery book
Michael has a series of Audio Training that receive CEU's from Disaster Recovery Institute (DRI) and other certifying organizations..
Cyber Security Training for - 6 CEU's
Business Continuity Management for 20 CEU's. www.rwknowledge.com
Michael's been honored as Top Woman in her field at a White House Luncheon and was selected out of the world to write the prolog for the chapter on RISK Management by the United Nations for their Disaster Book which was given to the head of state for every UN member nation. She has recently been named on the list of "Women of Distinction for 2015" by Women of Distinction Magazine for her work in Cyber Security.
She was selected to speak on Cyber Security Incident Response and SIEM at such recent conferences as:
International ISSA Conference in Chicago
NYS Cyber Security Conference - Co Spoke with Acting CISO for New York State
ISACA Western New York Conference
Metric Stream Round Table in New York City