Contact MERC Training Center
Join MERC Training Center on FacebookTwitter with MERC Training CenterConnect with MERC Training Center on LinkedIn

(+ 1 week optional workshop) Implementing IT Security in Your Organization Risk Analysis & Methodology

Locations & Dates:

Date: 20 - 24 Aug 2017
Ref: B9213
Location: UK (London)
Fees: 5500 

MERC Training Center reserves the right to alter dates, content, venue and trainer with a reasonable notice time.
One extra free place for every 2 paid nominees

Program Overview

In this program you will learn about...

This Program provides the necessary step by step approach and methodology for systematically evaluating an information system's security. 

It includes  

  1. Information as a source of competitive advantage
  2. Information Needs for Decision Making
  3. Limiting Information Access
  4. Systematic evaluation of information system security.

Program Content

(Each program is customized based on real needs of the participants - Day by Day Agenda will be provided to the participants at the start of the program)
In this program you will learn about the Computer Security Fraud Prevention…

  1. Practical Issues - The Security Situation
  2. Security Strategic Issues
  3. Industry Methodologies, Standards & Best Practices
  4. Business Mapping of Operations to Identify Security Risks - Flow Charts
  5. How Secure are Your Computer Security Fraud Prevention Practices?
  6. How safe is your computer system from  Viruses, hacking and fraud.
  7. Analyzing
    1. Do you have a problem?
    2. How serious is it?
    3. What should you do?
    4. How to evaluate the risk?
    5. How to implement controls?
  8. Methodology for
    1. How to identify information assets and controls?
    2. How to quantify risks, likely damage causes for concern?
    3. To Understand the responses to any threat know which to use.
    4. Check your IT infrastructure - Identify weak links
    5. Review the success of key staff members in implementing controls
  9. Clarify your vulnerability to outsiders and staff - including providing them an Action Plan to Preserve Data Security on their Systems and Work Methods
  10. Planning the Security System
  11. Information Technology Security Standards Adoption
  12. Implementing Computer Security Improvements