Keynote Address: Security Professionalism S1: Cybercrime Part 1: Legal Aspect in France S1: Cybercrime Part 2: Police Perspective S1: Cybercrime Part 3: Legal Procedures of Computer and Network Misuse in EU Countries Cybercrime Discussion S2: ISO 27001- A Standard you will Have to Deal With S3: Governance and Information Security Round Table Part 1 S3: Governance and Information Security Round Table Part 2 S3: Governance and Information Security Round Table Part 3 Governance and Information Security Round Table Discussion S4: Biometry: State of Art S5: Business Continuity Planning (BCP) Exercise Methodologies, Planning and Lessons Learned S6: The Centennial Flood in Paris - Anticipating and Taking Actions for Disasters |
RISK MANAGEMENT GUIDE
Introduction: Understanding risk
An overview of the risk management process
How to define an acceptable level of risk
How to write an information risk management policy
How to implement an effective risk management team
Information risk management: Defining the scope, methodology and tools
How to conduct a risk analysis
How to deal with risk
Global Technology Audit Guide (GTAG) son una serie de publicaciones de IIA (The Institute of Internal Auditors) que tratan de asesorar en TI tanto a auditores internos con externos.
Marzo 2006: Global Technology Audit Guide
Cuarta guía: Management of IT Auditing
· Define IT
· Evaluate IT
· Define IT Audit Universe
· Execute IT Audits
· Manage the IT Audit Function.
Visite nuestra sección de Boletines.