Introduction to information security and threats.
• Business approach to establishing, implementing and maintaining an Information Security Management System
• Background to the ISO/IEC 17799/ BS 7799 standards
• Business applications of the ISO/IEC 17799/ BS 7799 standards
• Process of building an Information Security Management system (ISMS) after conducting
• Risk Assessment
• Risk Management
• Control selection.
• Policy Design, Development and Maintenance
• BS7799 controls – a short overview
• Roadmap to BS7799 certification
• BS 7799 Audits
Tuesday, February 10, 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment