Course : Information System Security: Overview

Information System Security: Overview

Download in PDF format Share this course by email 2


With the rise of digital technology expanding growth opportunities, the management of Information System security has become a major issue for all companies. The purpose of this seminar is to give an overview of actions and solutions to help ensure the security of your IS: From analyzing risks to optimally implementing security solutions.


Inter
In-house
Custom

Seminar in person or remote class

Ref. SSI
Price : 2890 € E.T.
  3d - 21h00




With the rise of digital technology expanding growth opportunities, the management of Information System security has become a major issue for all companies. The purpose of this seminar is to give an overview of actions and solutions to help ensure the security of your IS: From analyzing risks to optimally implementing security solutions.

Teaching objectives
At the end of the training, the participant will be able to:
  • Master the security governance process
  • Use the business frameworks and associated standards of the ISO 27K series
  • Know the French and European legal framework (LPM, NIS, GDPR, etc.)
  • Create an action plan to achieve the objectives of the security policy
  • Develop an appropriate and proportionate response to reduce cyber risks

Intended audience
Engineers serving as CISOs, IT directors or managers, Security technicians or engineers, project managers who incorporate security constraints.

Prerequisites
No particular knowledge.

Course schedule

Fundamentals of information system security

  • The definition of process/information assets and supporting assets (IT).
  • The AICT/P classification: Availability, Integrity, Confidentiality and Traceability/Proof.
  • The definition of the ISS risk and its specific properties (vulnerabilities, threats).
  • Different types of risks: Accident, error, malevolence.
  • The emergence of cyber risk, APTs, preparing for a cyber crisis.
  • Essential outside sources of information (ANSSI, CLUSIF, ENISA, etc.).

The ISS task force: multiple business profiles

  • The role and responsibilities of the CISO, the relationship with the IT department.
  • Towards a structured and described safety organization, identify competences.
  • The role of the asset owners and the need for management to be involved.
  • Profiles of architects, integrators, auditors, pen-testers, supervisors, risk managers, etc.
  • Building a competent team, trained and responsive to changes in the cyber realm.

Standardization and regulatory frameworks

  • Incorporating business, legal and contractual requirements. The compliance approach.
  • An example of a business regulation: PCI DSS to protect sensitive data.
  • Security measures to achieve confidentiality and data integrity.
  • An example of legal regulation: NIS directive/France’s Military Programming Law.
  • The 4 areas of security as seen by the EU and ANSSI: Governance, Protection, Defense, and Resilience.
  • Security measures to achieve process availability and integrity.
  • The ISO 27001 standard in an information security management system approach (Deming cycle/PDCA).
  • The universal best practices of the ISO 27002 standard, the minimum essential knowledge.
  • Security areas: from policy to compliance to IT security.
  • Developing a Security Assurance Plan in the customer/supplier relationship.

The risk analysis process

  • Incorporating Risk Analysis into the security governance process.
  • Identification and classification of risks, accidental risks and cyber-risks.
  • The ISO 31000 and 27005 standards and the relationship of the risk process to the ISO 27001 ISMS.
  • From risk assessment to the risk mitigation plan: Best process activities.
  • Knowledge of predefined methods: French EBIOS RM approach, U.S. NIST approach, etc.

Security audits and the user awareness plan

  • Audit categories, from organizational audits to intrusion tests.
  • Best practices of the 19011 standard applied to security.
  • How to certify your auditors. Example with PASSI in France.
  • Security awareness: Who? What? How?
  • The need for planned, budgeted awareness.
  • Different formats of awareness: Face-to-face or virtual?
  • The security charter, its legal standing, its contents, its penalties.
  • Quizzes and serious games, for example with the ANSSI MOOC.

The cost of security and backup plans

  • Security budgets, available statistics.
  • The definition of Return On Security Investment (ROSI).
  • Cost assessment techniques, different calculation methods, calculating the TCO.
  • Hedging risks and the continuity strategy.
  • Backup, continuity, recovery, and crisis management plans, BCP/BRP, IT contingency plans, RTO/RPO.
  • Developing a continuity plan, fitting it into a security approach.

Designing optimal technical solutions

  • Structuring its logical and physical protection. How to develop defense in depth.
  • The three main areas of computer security (networks, data, software).
  • Partitioning your sensitive networks, network and application firewall technologies.
  • Make your data unreadable during storage and transport, cryptographic techniques.
  • Securing your software through hardening and secure design.
  • Software vulnerability management, how to use CVE/CVSS.

Security monitoring

  • Operational indicators for governance and security.
  • Cyber management: ISO-compliant dashboard.
  • Preparing your defense (IDS, incident detection, etc.).
  • Alert processing and cyber forensics, the role of CERTs.

Violations of law relating to Automatic Data Processing Systems

  • Legal definition in France of an Automatic Data Processing System (STAD).
  • Types of violations, European context, the LCEN law. The GDPR regulation.
  • What legal risks are there for the company, its leaders, the CISO?

Recommendations for “legal” IS security.

  • Personal data protection, penalties for non-compliance.
  • Use of biometrics in France.
  • Employee cybersurveillance: Legal limits and restrictions.
  • Employee rights and penalties incurred by the employer.


Customer reviews
4,4 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class