In this course, you will learn about
-
1
Effective Security Governance: Learn how to organize a successful information security manager function that aligns with your organization’s business needs.
-
2
Understand the importance of internal marketing, getting buy-in, by stakeholder collaboration with often conflicting interests, and maintaining independence for effective security management.
-
3
Explore a practical, not theoretical, model of security risk management, which serves as the foundation for many current legal requirements and a robust security strategy.
-
4
Real-world Mitigation Techniques: Identify the most problematic areas in security and discover proven risk mitigation methods.
-
5
Security Awareness: myths and the practice, that is, what to consider for a truly effective awareness program.
About this course
How to build and implement a robust, effective and sustainable (cyber)security strategy
Information security is a very broad concept, although it is most often associated with fighting cybercriminals, penetration testing, and similar activities. In practice, however, security is achieved through the planned implementation of a strategy, which requires the effort of the entire organization.
- Effective Security Governance: Learn how to organize a successful information security manager function that aligns with your organization’s business needs.
- Understand the importance of internal marketing, getting buy-in, by stakeholder collaboration with often conflicting interests, and maintaining independence for effective security management.
- Explore a practical, not theoretical, model of security risk management, which serves as the foundation for many current legal requirements and a robust security strategy.
- Real-world Mitigation Techniques: Identify the most problematic areas in security and discover proven risk mitigation methods.
- Security Awareness: myths and the practice, that is, what to consider for a truly effective awareness program.
Your instructor
The instructor has served as CIO, CSO/CISO in diverse sectors such as industry, FMCG, e-commerce, financial services, and startups for nearly 30 years. He is a certified yet pragmatic IT and security auditor, and experienced manager at the intersection of IT and modern business. He is a speaker at international conferences and, member of ISACA and Cloud Security Alliance. In his spare time, he pursues his passion for hiking in extremely low temperatures.
Training format: Comprehensive Courses
Full day or multi-day trainings for thorough learning and skill development.
Format
Comprehensive Course
Location
EU on-site
Language
Polish/English
Attendees
No limit
Duration
2 hours
This training is ideal for security managers and professionals looking to enhance their skills with actionable insights and real-world applications.
Prerequisites: basic security concepts, basic technical know-how in IT: networking/OSI model, cloud, basic IT architecture and processes
Izabela Kwiatkowska
Senior Consultancy Manager and responsible for 7N Academy, Poland
Phone: +48 728 901 071
Email: izab@7n.com
Cases, insights & courses
Explore related cases and articles or discover new courses.