SlideShare a Scribd company logo
1 of 19
IT Governance and Information System
Security Management
Global Opportunities and Career Prospects
PRESENTED BY CSSRL ACCREDITED EXTENSION CENTER PUNE
What is IT Security ?
• IT Security is the body of technologies, processes and practices designed to protect
networks, computers, programs and data from attack, damage or unauthorized access.
In a computing context, the term security implies cyber security.
• Its all about maintaining Information CONFIDENTIALITY, INTEGRITY & AVAILABILITY
• An Industry that is currently strengthening Parent and Associated Business Backbone
of every Commercial or Non-Commercial Enterprise Setup.
What is IT Security ?
Information
Security
C
Confidentiality
A
Availability
I
Integrity
Assurance that the information is
accessible only to those authorized
to have access
Confidentiality breaches may occur
due to improper data handling or a
hacking attempt
The trustworthiness of data
or resources in terms of
preventing improper and
unauthorized changes
Assurance that information
can be relied upon to be
sufficiently accurate for its
purpose
Assurance that the systems
responsible for delivering,
storing, and processing
information are accessible when
required by the authorized users
Why IT Security?
The increasing number of security breaches has led to increasing information
security concerns among organizations worldwide.
Organizations and their information systems and networks are exposed with
SECURITY THREATS such as fraud, espionage, fire, flood and sabotage from a
wide range of sources.
What is IT Governance?
• IT Governance or Information Security Management Systems (ISMS) is a systematic and
structured approach to managing information so that it remains secure.
• ISMS implementation includes policies, processes, procedures, organizational structures
and software and hardware functions.
• ISMS implementation carries organization’s objectives, security requirements, processes
employed, size and structure.
Why IT Governance?
• 100% Secured Business Process Model is IMPOSSIBLE though every Organization aspires for it.
• Thus there is a need to look at information security from a HOLISTIC PERSPECTIVE , and to have an
information security management methodology to protect information systematically. This is where the
need for ISMS comes in.
• ACHIEVING INFORMATION SECURITY is a huge challenge for organization as it CANNOT BE
ACHIEVED THROUGH TECHNOLOGICAL MEANS ALONE.
Why IT Governance?
Information
Security
Management
System
Structured Management of Information System
Conformity with Best Security Practices
Major Prevention against Data Protection Issues
Global Positioning and Reputation
Reduction in Cost against Information Loss
Improved Returns on Security Investment
Global Standardization
Reliable Service Model for End users and Clients-Customers
And More…
Threats
Legislation
Identity Mgmt Assurance
Controls
Business
Impacts
Assets
Organization
Information System
exposing To a loss of
causing
causing
which are mitigated by
which requirecausing
exploit +
which protect against
reduce
+
+
Vulnerabilities
Confidentiality
Integrity
Availability
Typical Business Security Cycle
Cycle Begins
Who needs IT Governance ?
SOFTWARE
DEVELOPMENT FIRMS
BANKING
(ONLINE-REGULAR)
TELECOMMUNICATION
INDUSTRY
GOVERNMENT
INFORMATION CENTERS
ATOMIC POWER HOUSES MEDIA
EDUCATIONAL
INSTITUTIONS
ONLINE RETAIL INDUSTRY IT SERVICE INDUSTRY
DEFENCE INSTITUTIONS
AND FIRMS
STOCK MARKET SOCIAL MEDIA
WEB DEVELOPMENT
INDUSTRY
HEALTH CARE INDUSTRY
WEATHER FORCASTING
SECTOR
HOSPITALITY INDUSTRY AUTOMATION INDUSTRY
AND EVERY INDUSTRY THAT
RELIES UPON
IT BACKBONE
Career in IT Governance
Currently as almost every Commercial Non-Commercial Enterprise Setup relies upon IT backbone.
EVERY INDUSTRY REQUIRES IT SECURITY MANAGERS’ WORKFORCE to ensure Robust Security
Governance.
Chief Information Security Manager
Security Auditor
Security Architect
Regulatory Compliance Manager
ISO 27001 Lead Auditor
ISO 27001 Lead Implementer
Security Operations Manager
Network Manager
Security Analyst
Risk Analyst
Risk Assessment Manager
Security Consultant
And More than 15 Career Profile
Career in IT Governance
How to Get in ?
• More than 67% of IT Security Professionals Across World are
Commerce or Non-IT Graduates. Thus simply EARN ELIGIBILITY.Graduation
• EARN SKILLS AND HANDS ON EXPERIENCE through
Professional Training strictly aligned with Industrial Trends and
Standards
Industrial Training
• Get your Skills Globally Certified with ISACA, ISC2, BSI, PCI,
Axelos and other International Certification Bodies. EARN
CREDITABILITY
Global Certification
• IT Security Management Industry favors Experienced Management
Professionals for Top Recruitments. Thus EARN IT SECURITY
ASSOCIATED DOMAIN EXPERIENCE.
Work Experience
• Your Industrial worth at Globe is over 70000$ ANNUALLY now.Ready to Hit Opportunity
How can we help you ?
Who we are?
Cyber Security Studies and Research Laboratory, also
popular as CSSRL can be well defined as
an IT Security Company incorporated under 1956
Company Act, Ministry of Corporate Affairs, GOI
Offering a Spectrum of more than 17 State-of-Art
Professional and Intellectual Services, CSSRL is
motivated by its rich ethics commitments for
disseminating Cyber Security Professional Training
and improvising best of IT Security Practices and
Standards across variegated Critical Information
Systems.
CSSRL operations span THREE MAJOR BUSINESS
VERTICALS
1. Education and Training Services
2. Business Services (Security Services)
3. Franchising Services
• More than 67% of IT Security Professionals Across World are
Commerce or Non-IT Graduates. Thus simply EARN ELIGIBILITY.Graduation
• EARN SKILLS AND HANDS ON EXPERIENCE through
Professional Training strictly aligned with Industrial Trends and
Standards
Industrial Training
• Get your Skills Globally Certified with ISACA, ISC2, BSI, PCI,
Axelos and other International Certification Bodies. EARN
CREDITABILITY
Global Certification
• IT Security Management Industry favors Experienced Management
Professionals for Top Recruitments. Thus EARN IT SECURITY
ASSOCIATED DOMAIN EXPERIENCE.
Work Experience
• Your Industrial worth at Globe is over 70000$ ANNUALLY now.
Ready to Hit
Opportunity
Bridging the Gap
CSSRL Pedagogy Highlights
CSSRL carries Training on More than 17 Domains of
IT Security out of which following areas generates
Trained Security Managers:
• IT System Security Management
• Corporate Security Modeling
• ISO 27001 Lead Audit
• Business Continuity
• Policy-Procedure Development
• Risk Assessment and Analysis
• Risk Mitigation and Controls
CSSRL introduces Certification in IT Governance (CITG) as
Foundation Program in IT System Security Management.
Certification in IT Governance (CITG)
• CITG V1.0 or Certification in IT Governance is a
highly professional certification to assist IT Experts
and Organizations align IT Framework and Security
Model with Structured Business Strategies to ensure
continuity of Business Operations without breach into
Critical Information Systems. Accredited with
IADL(UK), CITG sets a globally recognized
International Credit-based Certification in Information
Security Management Systems.
• CITG V1.0 furthers this training by offering Industrial
Training for International Certifications like CISA,
CISM , ISO 27001 etc
• CITG V1.0 also carries optional opportunity for IT
Security Management Internship that fulfills Work
Experience Requirement to fetch Best place in
Industry.
Any Question ?
Contact Us @
CSSRL AEC, Near Dena Bank, Opposite
Dominos Pizza,Sanapati Bapat Road, Pune-
411016
http://pune.cssrl.in/
09820378258 / 02041217411
pune@cssrl.in
https://www.facebook.com/cssrlpune
https://in.linkedin.com/in/cssrlpune
https://twitter.com/cssrl_pune

More Related Content

What's hot

Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr Wafula
Discover JKUAT
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 

What's hot (20)

Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr Wafula
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
IT Security & Governance Template
IT Security & Governance TemplateIT Security & Governance Template
IT Security & Governance Template
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Security operation center
Security operation centerSecurity operation center
Security operation center
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
 

Viewers also liked

Theater revenue
Theater revenueTheater revenue
Theater revenue
Sara Hicks
 
HP Software - The Bto Solution
HP Software - The Bto SolutionHP Software - The Bto Solution
HP Software - The Bto Solution
HPDutchWorld
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Capgemini
 
Ngen oss bss - architecture evolution
Ngen oss bss - architecture evolution Ngen oss bss - architecture evolution
Ngen oss bss - architecture evolution
Grazio Panico
 

Viewers also liked (18)

Information Systems Governance
Information Systems GovernanceInformation Systems Governance
Information Systems Governance
 
C-Sec Pro
C-Sec Pro C-Sec Pro
C-Sec Pro
 
Hp Bto Bsa
Hp Bto BsaHp Bto Bsa
Hp Bto Bsa
 
Theater revenue
Theater revenueTheater revenue
Theater revenue
 
Essential reporting for capacity and performance management webinar 11 18
Essential reporting for capacity and performance management webinar 11 18Essential reporting for capacity and performance management webinar 11 18
Essential reporting for capacity and performance management webinar 11 18
 
HP Software - The Bto Solution
HP Software - The Bto SolutionHP Software - The Bto Solution
HP Software - The Bto Solution
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer Satisfaction
 
Network security
Network securityNetwork security
Network security
 
Cobit 5 for information security
Cobit 5 for information securityCobit 5 for information security
Cobit 5 for information security
 
Resource mgmt capacity to planning to reporting actuals - Oracle Primavera Co...
Resource mgmt capacity to planning to reporting actuals - Oracle Primavera Co...Resource mgmt capacity to planning to reporting actuals - Oracle Primavera Co...
Resource mgmt capacity to planning to reporting actuals - Oracle Primavera Co...
 
The Value of Data for Digital Business Models
The Value of Data for Digital Business ModelsThe Value of Data for Digital Business Models
The Value of Data for Digital Business Models
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
La Gouvernance des Données
La Gouvernance des DonnéesLa Gouvernance des Données
La Gouvernance des Données
 
Ngen oss bss - architecture evolution
Ngen oss bss - architecture evolution Ngen oss bss - architecture evolution
Ngen oss bss - architecture evolution
 
Information system development
Information system development Information system development
Information system development
 
Capacity Management
Capacity ManagementCapacity Management
Capacity Management
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Understanding IT Governance and Risk Management
Understanding IT Governance and Risk ManagementUnderstanding IT Governance and Risk Management
Understanding IT Governance and Risk Management
 

Similar to IT governance and Information System Security

20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
Carl Bradley Pate
 

Similar to IT governance and Information System Security (20)

Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
 
SpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptxSpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptx
 
Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance Partner
 
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCHow Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
 
Enroll in our Certified Cyber Security Courses in Dubai
Enroll in our Certified Cyber Security Courses in DubaiEnroll in our Certified Cyber Security Courses in Dubai
Enroll in our Certified Cyber Security Courses in Dubai
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
 
Securim Solutions Pvt Ltd
Securim Solutions Pvt LtdSecurim Solutions Pvt Ltd
Securim Solutions Pvt Ltd
 
SECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security CompanySECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security Company
 
Best Vapt Security Company Securium Solu
Best Vapt Security Company Securium SoluBest Vapt Security Company Securium Solu
Best Vapt Security Company Securium Solu
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
anilsa9823
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 

Recently uploaded (20)

Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing management
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 
Continuous Improvement Infographics for Learning
Continuous Improvement Infographics for LearningContinuous Improvement Infographics for Learning
Continuous Improvement Infographics for Learning
 
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote SpeakerLeadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
 
Empowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdfEmpowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdf
 
Discover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdfDiscover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdf
 
Does Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxDoes Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptx
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
LoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner CircleLoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner Circle
 
Disrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdfDisrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdf
 
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdfImagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
situational leadership theory by Misba Fathima S
situational leadership theory by Misba Fathima Ssituational leadership theory by Misba Fathima S
situational leadership theory by Misba Fathima S
 
Construction Project Management | Coursera 2024
Construction Project Management | Coursera 2024Construction Project Management | Coursera 2024
Construction Project Management | Coursera 2024
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
 
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg PartnershipUnlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Intro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptxIntro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptx
 

IT governance and Information System Security

  • 1. IT Governance and Information System Security Management Global Opportunities and Career Prospects PRESENTED BY CSSRL ACCREDITED EXTENSION CENTER PUNE
  • 2. What is IT Security ? • IT Security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber security. • Its all about maintaining Information CONFIDENTIALITY, INTEGRITY & AVAILABILITY • An Industry that is currently strengthening Parent and Associated Business Backbone of every Commercial or Non-Commercial Enterprise Setup.
  • 3. What is IT Security ? Information Security C Confidentiality A Availability I Integrity Assurance that the information is accessible only to those authorized to have access Confidentiality breaches may occur due to improper data handling or a hacking attempt The trustworthiness of data or resources in terms of preventing improper and unauthorized changes Assurance that information can be relied upon to be sufficiently accurate for its purpose Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users
  • 4. Why IT Security? The increasing number of security breaches has led to increasing information security concerns among organizations worldwide. Organizations and their information systems and networks are exposed with SECURITY THREATS such as fraud, espionage, fire, flood and sabotage from a wide range of sources.
  • 5. What is IT Governance? • IT Governance or Information Security Management Systems (ISMS) is a systematic and structured approach to managing information so that it remains secure. • ISMS implementation includes policies, processes, procedures, organizational structures and software and hardware functions. • ISMS implementation carries organization’s objectives, security requirements, processes employed, size and structure.
  • 6. Why IT Governance? • 100% Secured Business Process Model is IMPOSSIBLE though every Organization aspires for it. • Thus there is a need to look at information security from a HOLISTIC PERSPECTIVE , and to have an information security management methodology to protect information systematically. This is where the need for ISMS comes in. • ACHIEVING INFORMATION SECURITY is a huge challenge for organization as it CANNOT BE ACHIEVED THROUGH TECHNOLOGICAL MEANS ALONE.
  • 7. Why IT Governance? Information Security Management System Structured Management of Information System Conformity with Best Security Practices Major Prevention against Data Protection Issues Global Positioning and Reputation Reduction in Cost against Information Loss Improved Returns on Security Investment Global Standardization Reliable Service Model for End users and Clients-Customers And More…
  • 8. Threats Legislation Identity Mgmt Assurance Controls Business Impacts Assets Organization Information System exposing To a loss of causing causing which are mitigated by which requirecausing exploit + which protect against reduce + + Vulnerabilities Confidentiality Integrity Availability Typical Business Security Cycle Cycle Begins
  • 9. Who needs IT Governance ? SOFTWARE DEVELOPMENT FIRMS BANKING (ONLINE-REGULAR) TELECOMMUNICATION INDUSTRY GOVERNMENT INFORMATION CENTERS ATOMIC POWER HOUSES MEDIA EDUCATIONAL INSTITUTIONS ONLINE RETAIL INDUSTRY IT SERVICE INDUSTRY DEFENCE INSTITUTIONS AND FIRMS STOCK MARKET SOCIAL MEDIA WEB DEVELOPMENT INDUSTRY HEALTH CARE INDUSTRY WEATHER FORCASTING SECTOR HOSPITALITY INDUSTRY AUTOMATION INDUSTRY AND EVERY INDUSTRY THAT RELIES UPON IT BACKBONE
  • 10. Career in IT Governance Currently as almost every Commercial Non-Commercial Enterprise Setup relies upon IT backbone. EVERY INDUSTRY REQUIRES IT SECURITY MANAGERS’ WORKFORCE to ensure Robust Security Governance. Chief Information Security Manager Security Auditor Security Architect Regulatory Compliance Manager ISO 27001 Lead Auditor ISO 27001 Lead Implementer Security Operations Manager Network Manager Security Analyst Risk Analyst Risk Assessment Manager Security Consultant And More than 15 Career Profile
  • 11. Career in IT Governance
  • 12. How to Get in ? • More than 67% of IT Security Professionals Across World are Commerce or Non-IT Graduates. Thus simply EARN ELIGIBILITY.Graduation • EARN SKILLS AND HANDS ON EXPERIENCE through Professional Training strictly aligned with Industrial Trends and Standards Industrial Training • Get your Skills Globally Certified with ISACA, ISC2, BSI, PCI, Axelos and other International Certification Bodies. EARN CREDITABILITY Global Certification • IT Security Management Industry favors Experienced Management Professionals for Top Recruitments. Thus EARN IT SECURITY ASSOCIATED DOMAIN EXPERIENCE. Work Experience • Your Industrial worth at Globe is over 70000$ ANNUALLY now.Ready to Hit Opportunity
  • 13. How can we help you ?
  • 14. Who we are? Cyber Security Studies and Research Laboratory, also popular as CSSRL can be well defined as an IT Security Company incorporated under 1956 Company Act, Ministry of Corporate Affairs, GOI Offering a Spectrum of more than 17 State-of-Art Professional and Intellectual Services, CSSRL is motivated by its rich ethics commitments for disseminating Cyber Security Professional Training and improvising best of IT Security Practices and Standards across variegated Critical Information Systems. CSSRL operations span THREE MAJOR BUSINESS VERTICALS 1. Education and Training Services 2. Business Services (Security Services) 3. Franchising Services
  • 15. • More than 67% of IT Security Professionals Across World are Commerce or Non-IT Graduates. Thus simply EARN ELIGIBILITY.Graduation • EARN SKILLS AND HANDS ON EXPERIENCE through Professional Training strictly aligned with Industrial Trends and Standards Industrial Training • Get your Skills Globally Certified with ISACA, ISC2, BSI, PCI, Axelos and other International Certification Bodies. EARN CREDITABILITY Global Certification • IT Security Management Industry favors Experienced Management Professionals for Top Recruitments. Thus EARN IT SECURITY ASSOCIATED DOMAIN EXPERIENCE. Work Experience • Your Industrial worth at Globe is over 70000$ ANNUALLY now. Ready to Hit Opportunity Bridging the Gap
  • 16. CSSRL Pedagogy Highlights CSSRL carries Training on More than 17 Domains of IT Security out of which following areas generates Trained Security Managers: • IT System Security Management • Corporate Security Modeling • ISO 27001 Lead Audit • Business Continuity • Policy-Procedure Development • Risk Assessment and Analysis • Risk Mitigation and Controls CSSRL introduces Certification in IT Governance (CITG) as Foundation Program in IT System Security Management.
  • 17. Certification in IT Governance (CITG) • CITG V1.0 or Certification in IT Governance is a highly professional certification to assist IT Experts and Organizations align IT Framework and Security Model with Structured Business Strategies to ensure continuity of Business Operations without breach into Critical Information Systems. Accredited with IADL(UK), CITG sets a globally recognized International Credit-based Certification in Information Security Management Systems. • CITG V1.0 furthers this training by offering Industrial Training for International Certifications like CISA, CISM , ISO 27001 etc • CITG V1.0 also carries optional opportunity for IT Security Management Internship that fulfills Work Experience Requirement to fetch Best place in Industry.
  • 19. Contact Us @ CSSRL AEC, Near Dena Bank, Opposite Dominos Pizza,Sanapati Bapat Road, Pune- 411016 http://pune.cssrl.in/ 09820378258 / 02041217411 pune@cssrl.in https://www.facebook.com/cssrlpune https://in.linkedin.com/in/cssrlpune https://twitter.com/cssrl_pune