Book Online Tickets for Constructing Essential Cybersecurity Gov, Palo Alto. Given the global business environment, IT deployments are indispensable for enabling information reliability, processing efficiency, and communication expediency to acquire and maintain a competitive advantage. Because the information has measurable

Constructing Essential Cybersecurity Governance Processes

 

  • One Dial-in One Attendee

    Sale Date Ended

    USD 199
    Sold Out
  • Group-Max 10 Attendees-Location

    Sale Date Ended

    USD 449
    Sold Out
  • 1x Person - Unlimited viewing for 6 Months

    Sale Date Ended

    USD 229
    Sold Out
  • One CD-USB is for usage in one location only

    Sale Date Ended

    USD 299
    Sold Out
  • Live + Recorded Version

    Sale Date Ended

    USD 349
    Sold Out
  • Live + Training CD-USB

    Sale Date Ended

    USD 399
    Sold Out

Invite friends

Contact Us

Page Views : 2

About The Event

Given the global business environment, IT deployments are indispensable for enabling information reliability, processing efficiency, and communication expediency to acquire and maintain a competitive advantage. Because the information has measurable value, data collection, processing, storage, and transmission by organizational employees need appropriate safeguarding. Safeguarding information mandates addressing cybersecurity protection to ensure managerial due care and due diligence. Through Dr. Davis’ discussions, security professionals will acquire an appreciation for the complexities associated with ensuring an effective cybersecurity program.

Why Should You Attend:

Cybernetics control theory emphasizes the role of organizational structure in information governance. Information has been considered a quasi-physical concept related to the degree of organization in a system. From a system perspective, there is a presumption that governance structures are a process outcome. Structures deployed by an organizational governance system allocate rights and responsibilities within the structures and necessitates assurance that manager-leaders are operating effectively and expectantly within the defined structures.

During the “Constructing Essential Cybersecurity Governance Processes” webinar, Dr. Davis highlights an approach to deploying entity-centric information system frameworks, architectures, methods, and techniques to reduce the risk of a security breach. In terms of content, Dr. Davis converts selected standards and guidelines into practical applications using detailed examples and conceptual graphics.

Although organizations exist for various reasons, the broadcasting of information security breaches across industries is increasing public and private demands to institutionalize Cybersecurity Governance with program oversight. Organizational information and communication have employee responsibility and reporting structures. Formal organizational structures often reflect constructs associated with laws, regulations, policies, directives, procedures, standards, and rules. Informal organizational structures mirror the interlocking social makeup governing how people work together in practice. Researchers suggested that the executive team structure is a pivotal organization design choice.

IT permits collecting and processing large data volumes as well as inspires innovation. IT that links information systems have made intra-organizational communication almost seamless depending on product-specificity. Within a firm’s organizational structure, providing acceptable service delivery necessitates the installation of an adequate cybersecurity support system. In addressing cybersecurity, security service delivery and support may range from operational protection deployment to crisis response training. Concurrently, innovations may manifest in different forms that require managerial attention.

Areas Covered in the Webinar:

  • Cybersecurity proactive and reactive processes
  • Total governance integration and alignment requirements
  • Extracting convergence points when integrating frameworks
  • Architectural conceptualization to achieve framework integration
  • Cybersecurity Governance program considerations for sustaining congruence with corporate and information security governance
  • Cybersecurity Governance system factors for supporting cohesiveness with COBIT and ISO/IEC 27000 frameworks
  • Cybersecurity Governance process considerations that enable linkages with corporate and information security governance
  • Managerial activities for maintaining consistency with COBIT and ISO/IEC 27000 frameworks

Who Will Benefit:

  • Audit Committee Members
  • Risk Management Executives
  • Chief Audit Executives
  • External Audit Partners
  • Chief Executive Officers
  • Chief Financial Officers
  • Chief Information Officers
  • Compliance Executives
  • Chief Information Security Officers
  • Compliance Officers
  • Business Analyst
Instructor Profile:
Robert E. Davis

Robert E. Davis
Professor, Temple and West Chester University

Dr. Robert E. Davis obtained a Bachelor of Business Administration in Accounting and Business Law, a Master of Business Administration in Management Information Systems, and a Doctor of Business Administration in Information Systems Management from Temple, West Chester, and Walden University; respectively. Moreover, during his twenty years of involvement in education, Dr. Davis acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology.

Dr. Davis also obtained the Certified Information Systems Auditor (CISA) certificate — after passing the 1988 Information Systems Audit and Control Association’s rigorous three hundred and fifty multiple-choice questions examination; and was conferred the Certified Internal Controls Auditor (CICA) certificate by the Institute for Internal Controls.

Since starting his career as an information system auditor, Robert has provided data security consulting and IS auditing services to corporations as well as other organizations; in staff through management positions. Before engaging in the practice of IS auditing and information security consulting; Robert (as a corporate employee) provided inventory as well as general accounting services to Philip Morris, USA, and general accounting services to Philadelphia National Bank (Wells Fargo). Furthermore, he has prior experience as a freelance writer of IT audit and information security training material.

Dr. Davis received recognition as an accomplished, energetic auditor, author, and speaker with a sound mix of experience and skills in monitoring and evaluating controls. Based on his accomplishments, Temple University's Fox School of Business and Management Alumni Newsletter, as well as The Institute for Internal Controls e-newsletter featured Dr. Davis. Furthermore, he is an Advisory Board Member of The Institute for Internal Controls, the first and inaugural Temple University CISA in Residence and a founding Temple University Master of Science in IT Auditing and Cyber-Security Advisory Councilmen. Last, he accepted invitations to join Delta Mu Delta International Honor Society, the Golden Key International Honour Society, the Thomson Reuters' Expert Witness List, the IT Governance LTD expert panel, as well as the International Association of IT Governance Standards honorary membership group.

Refund Policy

Registrants may cancel up to two working days prior to the course start date and will receive a letter of credit to be used towards a future course up to one year from date of issuance. ComplianceOnline would process/provide refund if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange.

Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs. Substitutions can happen any time.