IT governance management strategy information security

Megaprime

IT Governance

IT Management

Information Security

Assessment & Training

Audits & Capability Assessment

Business Continuity Management

SPIRIT

Assessment & Training

Publications

    Conference Papers

    Presentations

 

References

    Useful Links

Megaprime develops and conducts information security and information system audit education, training and competency assessment.

Our education, training and competency assessment (ETA) methodology is derived from and closely aligned with the Australian National Training Information Service (NTIS ) Assessment and Workplace Training Package, BSZ40198.

We conduct education and training in:

◊     IT Governance
◊     Information System Audit and Control
◊     Information Security Management
◊     Applied Cryptography
◊     Business Continuity Management

 

IT Governance Workshop

This is an intensive two-day workshop for professionals that need to understand, implement and/or manage the process and procedure of IT Governance.  IT Governance is introduced as a component of Corporate Governance.  IT Governance is presented as a means for assuring IT Strategic Alignment, IT Value Delivery, Resource Management, Performance Measurement and Risk Management.  During the workshop the COBIT Framework and Management Guidelines are presented and explained in detail with reference to current business concerns and technology issues.  After each presentation attendees are guided through an exercise that reinforces the knowledge transferred to them by the presenter.  At the completion of the workshop attendees take away their knowledge and their portfolio of exercises that they can use as an IT Governance implementation framework for their organization.


Information System Audit and Control

This is an intensive five-day workshop for professionals that need to understand, implement and/or manage the process and procedure of Information System (IS) Audit and Control.  During the workshop the subject of IS Audit and Control is introduced; audit and control requirements for both management systems and information systems are presented and explained in detail.  After each presentation attendees are guided through an exercise that reinforces the knowledge transferred to them by the presenter.  At the completion of the workshop, attendees take away IS audit and control knowledge and their portfolio of exercises that they can use as a framework for IS audit and control implementation and management within their organization.


Information Security Management Workshop

This is an intensive five-day workshop for professionals that need to understand, implement and/or manage the Information Security Management process.  Participants will learn how to organize ISO/IEC 17799 (ISO/IEC 27002) recommended controls into information security services and integrate the services into an ISO/IEC 27001 compliant management system.  The information security environment is defined.  An information security architecture is described.  System security auditing tools, network security architecture, operating system security and application system security are discussed.  During the workshop key features of ISO/IEC 17799 (ISO/IEC 27002) and ISO/IEC 27001 are presented and explained in detail with reference to current business concerns and technology issues.  After each presentation attendees are guided through an exercise that reinforces the knowledge transferred to them by the presenter.  At the completion of the workshop attendees take away their knowledge and their portfolio of exercises that they can use as an ISO/IEC 17799 (ISO/IEC 27002) and ISO/IEC 27001 implementation framework for their organization.


Applied Cryptography Workshop

This is an intensive one-day workshop for professionals that need to understand, implement and/or manage the application of cryptography.  Cryptography provides the means of securing electronic communications, files, e-commerce and e-Government processes.  During the workshop key cryptographic methods, Public Key Infrastructure and communication security protocols are presented and explained in detail with reference to current business concerns and technology issues.  After each presentation attendees are guided through an exercise that reinforces the knowledge transferred to them by the presenter.  At the completion of the workshop attendees take away their knowledge and their portfolio of exercises that they can use as an implementation framework for their organization’s cryptographic methods, Public Key Infrastructure and communication security protocols.


Business Continuity Management Workshop

This is an intensive two-day workshop for professionals that need to understand, implement and/or manage the business continuity management service.  During the workshop the business continuity management is discussed as a means of risk management with reference to COBIT, ISO/IEC 17799 (ISO/IEC 27002) and the development of business continuity plans and contingency plans for critical business processes, business and support applications, operating systems, IT infrastructure, and accommodation facilities.  At the completion of the workshop attendees take away their knowledge and their portfolio of exercises that they can use as an implementation framework for their organization’s business continuity management service.

 

We can help your organization to assess and satisfy its training needs. Ask us how.

IT governance management strategy information security

Phone:  + 61 (0) 8 9447 8427
Fax:     + 61 (0) 8 9243 0369

15 Beach Road 
Marmion WA 6020
AUSTRALIA

e-Mail: megaprime@megaprime.com.au
www.megaprime.com.au

Date that the page was last edited: February 06, 2006