Description
* Please note that the recording links will be delivered to you via a downloadable word document in your confirmation e-mail. The materials that correspond with the recording will be automatically delivered upon purchasing via email from the website.
WHAT?
Explore the fundamental building blocks of a repeatable framework for managing cybersecurity risks. Your information security program can be more than a document created for compliance. This webinar will help develop a program that provides your institution with clear direction and guidance that meets and exceeds regulatory expectations while addressing real-world risks.
Some programs implemented today are a collection of documents pulled together over the years that exists primarily to satisfy regulatory requirements. The Information Security Program should be a coordinated set of policies that work together to implement a unified set of controls across the organization. This should be a daily playbook used by employees to fight cybercrime and not a collection of documents to satisfy auditors and examiners.
WHY?
The Information Security Program should be a daily playbook used by employees to fight cybercrime and not a collection of documents to satisfy auditors and examiners.
PROGRAM CONTENT
Upon completion of this program participants understand:
- Regulatory resources and requirements
- Basic framework of a solid program
- Detailed explanation of critical controls
- Next steps for improving your plan
- Leveraging the framework to make decisions
WHO?
This program is designed for Information Security Officer, IT Manager, Risk Officer, Internal Auditor, CIO, and Executives looking to better understand cybersecurity risks.