Pragmatic Information Security Management

This comprehensive course is designed for security professionals seeking a practical and pragmatic approach to information security and cybersecurity management.

#

In this course, you will learn about

  • 1

    Effective Security Governance: Learn how to organize a successful information security manager function that aligns with your organization’s  business needs. 

  • 2

    Understand the importance of internal marketing, getting buy-in, by stakeholder collaboration with often conflicting interests, and maintaining independence for effective security management. 

  • 3

    Explore a practical, not theoretical, model of security risk management, which serves as the foundation for many current legal requirements and a robust security strategy. 

  • 4

    Real-world Mitigation Techniques: Identify the most problematic areas in security and discover proven risk mitigation methods. 

  • 5

    Security Awareness: myths and the practice, that is, what to consider for a truly effective awareness program. 

About this course

How to build and implement a robust, effective and sustainable (cyber)security strategy 
Information security is a very broad concept, although it is most often associated with fighting cybercriminals, penetration testing, and similar activities. In practice, however, security is achieved through the planned implementation of a strategy, which requires the effort of the entire organization. 

  • Effective Security Governance: Learn how to organize a successful information security manager function that aligns with your organization’s  business needs. 
  • Understand the importance of internal marketing, getting buy-in, by stakeholder collaboration with often conflicting interests, and maintaining independence for effective security management. 
  • Explore a practical, not theoretical, model of security risk management, which serves as the foundation for many current legal requirements and a robust security strategy. 
  • Real-world Mitigation Techniques: Identify the most problematic areas in security and discover proven risk mitigation methods. 
  • Security Awareness: myths and the practice, that is, what to consider for a truly effective awareness program.

Your instructor
The instructor has served as CIO, CSO/CISO in diverse sectors such as industry, FMCG, e-commerce, financial services, and startups for nearly 30 years. He is a certified yet pragmatic IT and security auditor, and experienced manager at the intersection of IT and modern business. He is a speaker at international conferences and, member of ISACA and Cloud Security Alliance. In his spare time, he pursues his passion for hiking in extremely low temperatures. 

Training format: Comprehensive Courses
Full day or multi-day trainings for thorough learning and skill development.

Course details

Format

Comprehensive Course

Location

EU on-site

Language

Polish/English

Attendees

No limit

Duration

2 hours

Who is this workshop for?

This training is ideal for security managers and professionals looking to enhance their skills with actionable insights and real-world applications.  

Prerequisites: basic security concepts, basic technical know-how in IT: networking/OSI model, cloud, basic IT architecture and processes 

Interested in learning more?

Izabela Kwiatkowska

Senior Consultancy Manager and responsible for 7N Academy, Poland

Phone: +48 728 901 071

Email: izab@7n.com