Blog Posts Tagged with "Training"


Webinar: HIPAA - HITECH Compliance for Smarties

March 28, 2011 Added by:Jack Anderson

Free Webinar: The key to successful compliance is having a clear step by step process, templated policies, procedures and forms, and having a personal privacy and security expert assigned to help you through the process. Delivering all this through cloud computing makes it cost effective...

Comments  (0)


Writing Mandatory Procedures for ISO 27001 / BS 25999-2

March 21, 2011 Added by:Dejan Kosutic

By implementing the procedures in a proper way, not only will you have your documentation up-to-date and under control, but you will also ensure that your internal audit makes sense and runs smoothly, and that you always improve your system in a systematic way...

Comments  (3)


IT Job Market Intel - Cutting Through the Fog

March 17, 2011 Added by:Mike Meikle

Once again, IT pros are going to have to develop significant business skills to set themselves apart from their mono-technical peers. While you may be able to capitalize on the Hot Skill Du Jour for a while, and we all have, it will continue to pay diminishing returns...

Comments  (0)


How to Become an ISO 27001 and BS 25999-2 Consultant

March 15, 2011 Added by:Dejan Kosutic

Becoming a consultant is not easy – not only do you have to excel in your knowledge of ISO 27001/BS 25999-2, you also have to be able to define and price your services, define and approach your target markets, manage your projects etc. If you approach this venture carefully, chances are you will succeed...

Comments  (0)


Cyber Security Strategies Summit in Washington, D.C.

March 15, 2011 Added by:Ben Zvaifler

The Cyber Security Strategies Summit will focus on education, the key to navigating the security landscape in a world of uncertainty. Whether you are managing new initiatives, implementing new programs or designing new technologies, being informed is the deciding factor in winning the cyber war...

Comments  (0)


IT Second Quarter Hiring Forecast Still Good

March 14, 2011 Added by:Bill Gerneglia

Network administration specialists were expected to be in most demand. These were cited at possible tough hires by 65 percent of CIOs. Windows Server administrators were next, at 60 percent, followed by desktop support at 57 percent and database management at 52 percent...

Comments  (0)


Does Your Company Have a Security Awareness Training Program?

March 10, 2011 Added by:Allan Pratt, MBA

Topics to discuss include good security practices such as making regular back-ups, encrypting sensitive data, turning off computers before leaving the office, carefully disposing of storage devices, and not installing illegal copies of software on company computers or devices...

Comments  (6)


Win an ISO 27001 and BS 25999 Training Membership

March 10, 2011 Added by:Infosec Island Admin

The webinar courses include documentation templates, access to E-learning tutorials and private time with the trainer for consultation on specific issues. You will experience the trainings right from your desk, eliminating travel costs and minimizing lost time away from your office...

Comments  (0)


Learn a Scripting Language to Make Security Work Easier

March 07, 2011 Added by:Brent Huston

Understanding programming logic basics is a huge plus for security folks who might have a more network/systems-centric background. It will help you understand a lot more about how applications work in your environment and how to best interact with them in ways to protect them...

Comments  (6)


Win the Security+ Prep Course from Global Knowledge

March 06, 2011 Added by:Infosec Island Admin

Drawing Prize: CompTIA's Security+ is the premier vendor-neutral security certification and is included in the approved list of certifications to meet DoD Directive 8570.1 requirements. Our Security+ courseware has received CompTIA Authorized Quality Curriculum (CAQC) approval...

Comments  (0)


ISO 27001 Risk Assessment Methodology and Process

March 03, 2011 Added by:Dejan Kosutic

Risk assessment is the first major step in implementation of ISO 27001, right after the ISMS Scope document and ISMS Policy; after the risk assessment is completed, risk treatment defines which controls are to be implemented and then the implementation of information security can start...

Comments  (1)


First Annual (Possibly Semi-Annual) OSSTMM Forum

March 02, 2011 Added by:Rod MacPherson

OSSTMM is very high level, and the thing that everyone seems to be in agreement on is the need for applied OSSTMM documents outlining how it can be applied to different realms, such as web applications, computer networks, system hardening, etc...

Comments  (4)


Cyber Security Strategies Summit

February 28, 2011 Added by:Ben Zvaifler

Geared towards enterprise and government security officers, the Cyber Security Strategies Summit presents case studies that will build on your knowledge of the industry as well as open your eyes to changes and innovations in the space. Topics being covered will include...

Comments  (0)


Can Cloud Computing Enhance Compliance?

February 27, 2011 Added by:Jack Anderson

Rebecca Herold, recently voted the #3 Best Privacy Advisor in the world and Jack Anderson, CEO of Compliance Helper discuss a new use of cloud computing, or Software as a Service (SaaS) to enhance compliance and improve security and privacy...

Comments  (0)


ISO 27001 Foundations Part 3: Annex A Overview

February 22, 2011 Added by:Dejan Kosutic

Annex A provides a catalog of 133 security measures (controls) for decreasing risks. Knowing what controls Annex A offers, how they can be used, and how the documentation is to be structured is very important both when carrying out risk treatment, and when planning to implement the controls...

Comments  (0)


How Much Does ISO 27001 Implementation Cost?

February 15, 2011 Added by:Dejan Kosutic

The greatest value of someone with experience helping you with this kind of project is that you won't end up in dead end streets - spending months and months doing activities that are not really necessary or developing tons of documentation not required by the standard. And that really costs...

Comments  (0)

Page « < 14 - 15 - 16 - 17 - 18 > »