BCS Certificate in Information Security Management Principles CISMP
This five-day course will run week commencing 03/09/2012 in Cardiff City Hall reduced from £2000 to £1175.
This course has been commissioned by Cardiff City Council and is being offered to Continuity Forum members, at cost, at the significantly discounted rate of £1175 + VAT. The advertised rate of this course is usually in the region of £2000 + VAT so this presents a fantastic saving for anyone wishing to attend this particular offering.
All course materials, the course exam, refreshments and lunch are included. Please note places are limited so early booking is advised. The rate may be negotiable for multiple bookings.
Over two days the London Cyber Conference 2011 delivered a truly international focal point to examine how our digital world is developing and share what needs to be done to keep the benefits, but remove some of the risks.
With over 700 people from 60 countries there really was a global presence and the issues discussed in the plenary and private sessions clearly communicated the breadth of the challenges being faced in cyberspace.
Delegates from around the world gathered in London to debate Cyberspace and its role in the modern world. The benefits of the 'Net' has helped drive an estimated 21% growth in the economies of countries over the past decade and the newest start-up can now be global at the click of a button.
Internet Communications has been revolutionised around the world and has contributed to the developed of vast social networks that cross borders, cultures and interests. There are now over two billion regular users of the Internet and this is continuing to grow and become ever more mobile as smart devices continue evolve placing the digital world in our hands wherever we are.
With all the opportunities the Net has been a powerful part of the development of communities and business, but there is a darker side.
International leaders from government and business are meeting in London to discuss cyberspace and how to manage its risks. The UK Foreign Secretary, William Hague, will welcomes participants form around the world including US Secretary of State Hillary Clinton, Swedish Foreign Minister Carl Bildt, and Jimmy Wales, the founder of Wikipedia.
Criminals are exploiting the growth of cyberspace. They are using it to extort money, steal identities, ideas and designs, defraud government departments and businesses, as well as exploit the most vulnerable in our societies, particularly children. The annual cost of cyber crime to the global economy could be as much as $1 trillion.
In a move that may well impact on all Business Continuity and IT Security departments the European Vice President responsible for Justice is calling for the introduction of rules forcing banks, e.commerce businesses, social networking sites and others who hold confidential data to tell customers as soon as there has been a data security breach.
Viviane Reding was previously responsible as an EU member for Information, Society and Media before taking the role of Vice-President of the European Commission, responsible for Justice, Fundamental Rights and Citizenship in February 2010.
In a speech centred on the need to bolster online privacy she said "trust in an 'information society' has been damaged by the recent events such as the Sony data breach". Her initiative comes at the end of a long line of data breaches that have affected not just many businesses, but also government departments, including health services and tax offices, around Europe.
To address the concerns raised by these events the Justice Minister is looking at toughening up data protection rules that are already in place for the telecommunications industry to include immediate notification to the regulator when Data has been compromised.
The Commissioner is also reviewing the possibility of introducing an enforcement arm that would be responsible for ensuring compliance with the regulations.
Reding is championing the need for plans to address the digital world and the increasing reliance and embedding if technology into everyday activities. The Minister outlined 5 pillars that were needed to build proper data protection. These are: the right to have data forgotten, transparency, 'privacy by design', making firms and authorities responsible for they handle all data and independent oversight and monitoring.
The responsibility to protect data is already enshrined under the EU Charter of Fundamental Rights, but Reding stressed the need for this Charter principles to be supported as the pace of technology change and use brings new risks.
Previous attempts to increase the regulation of Data Protection in business have failed due to the added cost burden and a lack of industry consistency on methods with the result that compliance has been been somewhat watered down.
This time around it may well be different though with the challenge of ensuring business continuity, security and compliance becoming much more important for all organisations.
The International Standards Organisation (ISO) has released a new set of international guidelines to help protect and ensure the security of information and communication technologies and boost Business Continuity capabilities.
ISO/IEC 27031:2011 is aimed at all organisations regardless of their type, size and complexity and it is hoped that through the adoption of the standard greater resilience against hacking, denial of service and malware attacks will be seen.
When you think about risks posed by IT today, your concerns go way beyond what’s happening in the data centre or the IT department. Information and Communications Technology is an essential part of virtually every business process. As a result, managing Technology Risk now means much more than protecting data. It means protecting the heart of the business itself.
The Internet is a wonderful tool when it works, but we are increasingly at a loss when it encounters a problem. Steve Durbin, Global VP at Information Security Forum (ISF), looks at what organisations should be doing to minimise the risks and boost their Business Continuity , as a growing proportion of commercial transactions are performed online.
Globalisation, cultural change and infrastructure weaknesses all underlying drivers
The Information Security Forum (ISF) has announced its predictions for the 10 most likely threat scenarios that organisations face in the future. According to its new Threat Horizon 2012 report, the rapid adoption of cloud computing, increasing use of mobile devices, growth of cybercrime and online espionage, and the merging of home and work life, all have a role to play in future risk management and contingency planning.
It is rare these days to find any organisation which does not rely in some way on computer data. From the very largest corporate through to the very smallest business the need to maintain access to information is absolutely vital. This seems pretty straightforward and it could be said almost simplistic, obvious even. Maybe so, but what about the data that has been removed from your direct control, that exists on the huge banks of servers and hard disks that are located across commercial data centres both in the UK and internationally.
High Performers & Foundational Controls: Building a strategy for Security and Risk Management
This Enterprise Management Associates White Paper discusses building a strategy security risk management.
With all the attention given to the increasing sophistication of threats, and the security implications of technology trends such as virtualisation and cloud computing, our enterprises ready for tomorrow's security risks? These are the questions being addressed in this white paper.
The White Paper concludes that for many organisations the answer is no!
A plethora of articles have explored the challenges of managing systems in a market downturn. The one common message is that information security professionals have to do more with less - to balance the rise in vulnerabilities and threat vectors with a fall in budget. Hence the increasing requirement to work smarter and develop holistic, sustainable approaches to information security management.
Fire, computer viruses and human error are viewed as the main threats to corporate data by European businesses, according to a survey by storage specialists Hitachi Data Systems. The latest edition of HDS’s bi-annual Storage Index reckons that low-tech 'old fashioned' threats pose the greatest risk of upsetting the operations of European corporates.
Half of IT managers employed by large-sized companies believe it would be relatively easy to gain the core passwords for their computer systems.
That is the warning of a survey by IT security firm Cyber-Ark. It said that 10% of firms never changed their central administrative passwords.
A further 5% did not even bother altering the manufacturer's default password that came with the system.