CISM Information Systems Security

  1. >
  2. Our plans
  3. >
  4. CISM Sécurité des Systèmes...

About this training:

Training duration :3 Days
Date de début :24 October 2024
Date de fin :26 October 2024
Language :French
Target population :• IT managers, security managers, IT operations managers, IT security advisors, compliance managers, IT reviewers and IT project managers. In short: to all people who professionally deal with the security of computer systems and who wish to obtain certification.
Certification:State approved certificate
Training method:Inter-Company training
Training site :5* hotel
Former :Consultant trainer in the field for many years.
Inscription Formation

Informations personnelles

Full name
Nom & Prénom
First Name
Last name

Informations professionnelles

Training objectives:

At the end of the training, participants will be able to:

  • Explain the relationship between executive leadership, corporate governance and information security governance.
  • Describe the components used to build an information security strategy.
  • Explain how the risk assessment process influences information security strategy.
  • Explain the process and requirements used to develop an effective information risk response strategy.
  • Describe the elements of an effective information security program.
  • Explain the process of developing and maintaining an enterprise information security program.
  • Describe the techniques used to assess the organization's capacity and readiness to manage an information security incident.
  • Décrire les méthodes permettant de mesurer et d’améliorer les capacités de réponse et de récupération.

The objectives of this training:

  • Explain the relationship between executive leadership, corporate governance and information security governance.
  • Describe the components used to build an information security strategy.
  • Explain how the risk assessment process influences information security strategy.
  • Explain the process and requirements used to develop an effective information risk response strategy.
  • Describe the elements of an effective information security program.
  • Explain the process of developing and maintaining an enterprise information security program.
  • Describe the techniques used to assess the organization's capacity and readiness to manage an information security incident.
  • Describe methods for measuring and improving response and recovery capabilities.

Nos plannings de formations.

EN