SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
1
YOUR INTERNATIONAL
COURSE FACILITATOR
Dr Mark T. Edmead
MBA, CISSP, CISA, CompTIA Security+
IT Security
Consultant & Trainer
MTE Advisors
Mark T. Edmead is a successful technology entrepreneur
with over 28 years of practical experience in computer
systems architecture, information security, and project
management.
Mark excels in managing the tight-deadlines and ever
changing tasks related to mission-critical project
schedules. He has extensive knowledge in IT security, IT
and application audits, Internal Audit, IT governance,
including Sarbanes-Oxley, FDIC/FFIEC, and GLBA
compliance auditing.
Mr. Edmead understands all aspects of information
security and protection including access controls,
cryptography, security management practices, network
and Internet security, computer security law and
investigations, and physical security.
He has trained Fortune 500 and Fortune 1000 companies
in the areas of information, system, and Internet security.
He has worked with many international firms, and has the
unique ability to explain very technical concepts in
simple-to-understand terms. Mr. Edmead is a sought after
author and lecturer for information security and
information technology topics.
Mark works as an information security and regulatory
compliance consultant. He has:
• Conducted internal IT audits in the areas of critical
infrastructure/ systems and applications,
• Assessed and tested internal controls of critical
infrastructure platform systems (Windows, UNIX, IIS, SQL,
Oracle)
• Assessed and tested internal controls of various critical
financial applications.
• Prepared risk assessments and determined risks to
critical financial data systems and infrastructure
components.
• Created test plans & processes and executed test plans.
• Conducted reviews of existing systems and
applications, ensuring appropriate security, management
and data integrity via control processes.
• Prepared written reports to all levels of management
• Participated in audit review panel sessions to address
results, conclusions and follow-up actions required.
Tel: +6016 3326360 Fax: +603 9205 7779 kris@360bsigroup.com
•
c
c
•
•
a
a
•
•
r
Tel: +6016 3326360 Fax: +603 9205 7779 kris@360bsigroup com
1. Bring your Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) for
private consultation review
2. BCP/DRP Step-by-step Guide
3. BCP/DRP templates and worksheets to aid you in applying and putting into
practice what you have learned from this workshop
4. FREE copy of the course material, case studies, and other related items of the
training workshop
1.1. BBriringng yyouourr BuBusisineness
private consultation rev
EXCLUSIVE:
titinunuitityy PlPlanan/D/Disisasasteterr ReRecocovvery
iew
ssss CConon
on rev
:: TEMPLATES & TAKEAWAYS
Sample Case Studies:
• A major Middle Eastern bank has been experiencing tremendous growth and management feels that
their current BCP and DRP plans outdated. In this case study the delegates with perform a business
impact analysis, based on interviews with key company stakeholders and subject matter experts, and
outline which business areas are the most critical and in need of improved continuity and recovery
plans.
• A manufacturing company is considering implementing a disaster recovery plan but does not know
which disaster recovery approach they should implement. In this case study the delegates with study
the business enterprise, perform a risk analysis, and determine if a hot site, cold site, warm site, or
another disaster recovery method is the best approach.
Using a carefully selected case study, course participants will:
• Create, document and test continuity arrangements for an organization
• Perform a risk assessment and Business Impact Assessment (BIA) to identify
vulnerabilities
• Select and deploy an alternate site for continuity of mission-critical activities
• Identify appropriate strategies to recover the infrastructure and processes
• Organize and manage recovery teams
• Test and maintain an effective recovery plan in a rapidly changing technology
environment
BENEFITS OF ATTENDING
Disasters could cripple your organization, suspending mission-critical processes and
disrupting service to your customers. These disasters could be man-made or natural
in nature.
The Business Continuity Plan addresses an organization’s ability to continue
functioning when normal operations are disrupted.
A Disaster Recovery Plan is used to define the resources, action, tasks, and data
required to manage the business recovery process in the event of a disaster. In this
workshop you learn to identify vulnerabilities and implement appropriate
countermeasures to prevent and mitigate threats to your mission-critical processes.
You will learn techniques for creating a business continuity plan (BCP) and the
methodology for building an infrastructure that supports its effective
implementation.
COURSE OVERVIEW
IT
SERIES
02 - 04 DECEMBER 2013
GRAND MILLENNIUM
KUALA LUMPUR
MALAYSIA
BUSINESS
CONTINUITY &
DISASTER
RECOVERY
PLANNING
EXCLUSIVE TAKEAWAY
For early bird bookings before 18-OCT-2013
FREE 1 Year Affiliate membership (worth £75)
with the Business Continuity Institute
(** refer to page 3 for further details)
2
WHO SHOULD ATTEND
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Information Security Officers
Chief Technology Officers
Business Continuity Officers
Heads of Departments in Information Security
Management Information Systems, IT
Infrastructure, IT Architecture, Network
Operations, IT Operations, IT Data Center,
DataBase Management, IT Deployment
IT Business Enterprise, IT Risk Management,
IT Quality Assurance, IT Audit, Risk Management,
Internal Audit, Disaster Recovery
WHY THIS EVENT
The aim of this interactive workshop is to provide
you with the skills critical to business continuity,
disaster recovery & risk management.
After attending this workshop, you will leave
fully armed with the knowledge needed to
create a business continuity plan (BCP) and the
methodology for building an infrastructure that
supports its effective implementation.
The combination of interactive presentations,
hands-on exercises and open discussion groups
along with real case studies, ensures you will
obtain maximum value from attending.
DAY2 RISK ASSESSMENT & RECOVERY
The Business Impact Assessment (BIA)
- What is a Business Impact Assessment?
- Assessing the risk to the enterprise
- How to identify business critical activities
- Impact versus likelihood of occurrence
Establishing the Recovery Options
- Choosing a recovery site
- Specifying equipment
- Choosing suppliers
- How to select backup and restore strategies
Where is the data?
- Why you need to classify levels of information
- Managing data at rest and in transit
- Understanding data access controls
- The value of knowing where your data resides
Maintaining user connectivity
- How to communicate the disaster and recovery efforts to users
- How to identify and eliminate single points of failure
- Communicating with the media
DAY1 BCP/DRP - CONCEPTS & PRINCIPLES
Introduction to Business Continuity and Disaster Recovery Planning
- The difference between business continuity and disaster recovery
- Why a recovery plan is an integral part of an organization’s operational
strategy
Understanding where the threats come from
- Understanding codes of practice and legal/regulatory compliance
requirements
- The step-by-step process for BCP/DRP
Protecting our assets
- What are we protecting?
- What are our mission-critical processes?
- How to prioritize what is important to protect
What is risk and how do we deal with it?
- Understanding risk assessment methodologies
- Matching the response to the threat based on the risk
- Enterprise vs. local risk management
- Top business continuity planning mistakes
The need for business continuation – a case study
- Introduction of fictitious business case
- Understand business continuity/disaster recovery needs
- Documenting the continuity requirements
COURSE
CONTENT
3
COURSE SCHEDULE
8.00
8.30
10.10 - 10.30
12.00 - 13.00
14.40 - 15.00
16.00
Registration & Coffee/Tea
Workshop commences
Morning coffee/tea
Lunch
Afternoon coffee/tea
End of day
“Session well organized. The trainer is very
conversant with the subject matter. Well delivered
and would definitely recommend to anyone else.”
- Habil Mutende, Manager Information Security & Change
Management, Central Bank of Kenya
“Excellent presentation, excellent attitude to
answer our questions & to share his experience.”
- Senior Manager, IT Department, Deloitte
“I have used Mark in key roles with high visibility
clients. Without hesitation I would highly
recommend Mark for any and all IT audit
engagements. His professionalism, deep
knowledge, and results oriented work style are
deeply valued by not only myself, but more
importantly by the all those who are lucky enough
to use his services.”- Russ Aebig, Director at Artesient
“We have used Mark Edmead on several projects in
the past few years including SOX readiness for
publicly traded companies and IT vulnerability
assessments for major financial institutions. He
always delivers professional and detail-oriented
workpapers on-time and within budget. Mark is
highly recommended and we will continue to use
him on other projects.”- Brenda Piazza, Director at CBIZ MHM
1
3
2
4
“Session well organized The trainer is ver1
Latest TESTIMONIALS
Affiliate members to Business Continuity Institute get access to the following membership
benefits:
- Continuity magazine – 4 per year (digital version)
- Monthly BCI ENewsletter
- Access to‘member only’section of BCI website
- Access to copies of BCI Workshop Reports
- Member rates on BCI products and services
- Networking opportunities at BCI organised events
- Access to BCI mentoring programme
- Access to discounted events
AffiAffililiatatee memembmbererss toto BBususininesesss CoContntininuiuityty IInsnstititututete ggetet aaccccesesss toto tthehe ffolollolowiwingng mmemembebersrshihipp
benefits:
**Affiliate membership to Business Continuity Institute
DAY3 PROJECT MANAGEMENT & REVIEW
BCP/DRP Project Management
- Identifying stakeholders
- Analyzing stakeholder needs
- Obtaining commitment from upper management
Review of the BCP/DRP Process
- Project initiation
- Risk analysis
- Business Impact analysis
- Develop/choose strategies
- Test and validate the plan
- Modify/update the plan
- Approve and implement the plan
Analysis of fictitious business case
Applying lessons learned
COURSE
CONTENT
PAYMENT DETAILSFEES
4
OTHER RELATED PUBLIC COURSES
IT Strategic Planning
Service Oriented Architecture (SOA)
IT Risk Management & Leadership
Preparing for the CISSP exam
Cybercrime & Fraud Investigation
IT Change Management
IT Project Management
360 BSI is passionate about providing strategic IT programs
and high potential training solutions across the region to build
personal competencies and organizational capability.
You will receive practical training from a professionally
qualified educator with over twenty years of teaching and
training experience.
Please feel free to mix-and-match topics from the areas listed
below to get the right training content for your staff. Other
topics may be available upon request.
IN-HOUSE TRAINING
Thank you for your registration!
* Save up to 50% for In-house Training program
Substitutions are welcome at any time. Please notify us at
least 2 working days prior to the event. All cancellations will
carry a 10% cancellation fee, once a registration form is
received. All cancellations must be in writing by fax or email
at least 2 weeks before the event date. Cancellations with
less than 2 weeks prior to the event date carry a 100% liability.
However, course materials will still be couriered to you.
General Information:
1
2
3
4
5
Cancellations/Substitutions
Payment is required within 5 days upon receipt of
the invoice.
All payments must be received prior to the event date
Hotel Contact Details:
Fax: +603 9205 7779
Tel: +603 9205 7772
Mobile: +6016 3326 360
Email: kris@360bsigroup.com
REGISTRATION FORM
360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL, 168 Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia.© www.360bsi.com/IT
Name
Name on tag
Job Title
Email
Mobile
:
:
:
:
:
Name
Name on tag
Job Title
Email
Mobile
:
:
:
:
:
Name
Name on tag
Job Title
Email
Mobile
:
:
:
:
:
1
2
3
DELEGATES
AUTHORIZATION
(This form is invalid without a signature)
Name :
Job Title :
Email :
( )Tel :
Organization :
Address :
Signature : Date: / /
USD 6,600- Special for Group of 3
USD 2,495 per delegate - register before 18-OCT-2013
USD 2,695 per delegate
Bank transfer:
360 BSI MIDDLE EAST LIMITED
Abu Dhabi Commercial Bank
Dubai Mall Branch, P.O.Box 49124 Dubai, U.A.E
Account No: 10065721319001
Swift No: ADCBAEAAXXX
IBAN No: AE780030010065721319001
The fee does not include any taxes (withholding or otherwise). In case of any taxes applicable
the client has to ensure that the taxes are paid on top of the investment fee paid for the course.
Compliance with the local tax laws is the responsibility of the client.
02 - 04 DECEMBER 2013
GRAND MILLENNIUM
KUALA LUMPUR
MALAYSIA
Registrations close ONE (1) week before the training dates.
The fees cover lunch, tea breaks, materials and certificate.
Official confirmation will be sent, once registration has been
received.
Participants will need to arrange their own accommodation.
Attire: Smart Casual
For Room Reservation, please contact Reservation Desk.
Tel: +60 3 2117 4899 Fax: +60 3 2142 1441
Grand Millennium Kuala Lumpur
160, Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia.
BUSINESS
CONTINUITY &
DISASTER
RECOVERY
PLANNING

Contenu connexe

Tendances

Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteHernan Huwyler, MBA CPA
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAGeorge Delikouras
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk ManagementTudor Damian
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteHernan Huwyler, MBA CPA
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Information risk management
Information risk managementInformation risk management
Information risk managementAkash Saraswat
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsArun Prabhakar
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organizationDan Morrill
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security ManagementEC-Council
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
IT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan HuwylerIT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan HuwylerHernan Huwyler, MBA CPA
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 

Tendances (20)

Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIA
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
 
Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessment
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Information risk management
Information risk managementInformation risk management
Information risk management
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification Solutions
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
IT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan HuwylerIT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan Huwyler
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 

Similaire à Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala Lumpur Malaysia

Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...360 BSI
 
Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...
Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...
Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...360 BSI
 
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...360 BSI
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
Root Cause Analysis, 17 - 18 September 2014 Dubai, UAE
Root Cause Analysis, 17 - 18 September 2014 Dubai, UAERoot Cause Analysis, 17 - 18 September 2014 Dubai, UAE
Root Cause Analysis, 17 - 18 September 2014 Dubai, UAE360 BSI
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
 
IT Governance & Leadership 17 - 20 November 2014 Dubai, UAE
IT Governance & Leadership 17 - 20 November 2014 Dubai, UAEIT Governance & Leadership 17 - 20 November 2014 Dubai, UAE
IT Governance & Leadership 17 - 20 November 2014 Dubai, UAE360 BSI
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
 
Data analysis and interpretation flyer
Data analysis and interpretation flyerData analysis and interpretation flyer
Data analysis and interpretation flyerKALVI World
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...360 BSI
 
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...360 BSI
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
Serious Incident Prevention ™ 11 - 12 December 2013 Dubai UAE
Serious Incident Prevention ™ 11 - 12 December 2013 Dubai UAESerious Incident Prevention ™ 11 - 12 December 2013 Dubai UAE
Serious Incident Prevention ™ 11 - 12 December 2013 Dubai UAE360 BSI
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Priyanka Aash
 
Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15David John Bollaert
 
Certified Predictive Modeler (CPM)
Certified Predictive Modeler (CPM)Certified Predictive Modeler (CPM)
Certified Predictive Modeler (CPM)GICTTraining
 
New hospital it strategy 2
New hospital it strategy 2New hospital it strategy 2
New hospital it strategy 2Pankaj Gupta
 
Records & Information Management, Document Management & Archiving (Doha, Qata...
Records & Information Management, Document Management & Archiving (Doha, Qata...Records & Information Management, Document Management & Archiving (Doha, Qata...
Records & Information Management, Document Management & Archiving (Doha, Qata...360 BSI
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
Chief Inofrmation / Technology Summit
Chief Inofrmation / Technology SummitChief Inofrmation / Technology Summit
Chief Inofrmation / Technology Summitguested3c50
 

Similaire à Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala Lumpur Malaysia (20)

Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
 
Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...
Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...
Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...
 
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Root Cause Analysis, 17 - 18 September 2014 Dubai, UAE
Root Cause Analysis, 17 - 18 September 2014 Dubai, UAERoot Cause Analysis, 17 - 18 September 2014 Dubai, UAE
Root Cause Analysis, 17 - 18 September 2014 Dubai, UAE
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
 
IT Governance & Leadership 17 - 20 November 2014 Dubai, UAE
IT Governance & Leadership 17 - 20 November 2014 Dubai, UAEIT Governance & Leadership 17 - 20 November 2014 Dubai, UAE
IT Governance & Leadership 17 - 20 November 2014 Dubai, UAE
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
 
Data analysis and interpretation flyer
Data analysis and interpretation flyerData analysis and interpretation flyer
Data analysis and interpretation flyer
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
 
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Serious Incident Prevention ™ 11 - 12 December 2013 Dubai UAE
Serious Incident Prevention ™ 11 - 12 December 2013 Dubai UAESerious Incident Prevention ™ 11 - 12 December 2013 Dubai UAE
Serious Incident Prevention ™ 11 - 12 December 2013 Dubai UAE
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
 
Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15
 
Certified Predictive Modeler (CPM)
Certified Predictive Modeler (CPM)Certified Predictive Modeler (CPM)
Certified Predictive Modeler (CPM)
 
New hospital it strategy 2
New hospital it strategy 2New hospital it strategy 2
New hospital it strategy 2
 
Records & Information Management, Document Management & Archiving (Doha, Qata...
Records & Information Management, Document Management & Archiving (Doha, Qata...Records & Information Management, Document Management & Archiving (Doha, Qata...
Records & Information Management, Document Management & Archiving (Doha, Qata...
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Chief Inofrmation / Technology Summit
Chief Inofrmation / Technology SummitChief Inofrmation / Technology Summit
Chief Inofrmation / Technology Summit
 

Plus de 360 BSI

Information Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big DataInformation Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big Data360 BSI
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
 
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAEEffective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE360 BSI
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
 
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAEEffective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE360 BSI
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
 
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...360 BSI
 
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...360 BSI
 
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAEAdvanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE360 BSI
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia360 BSI
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...360 BSI
 
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...360 BSI
 
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia360 BSI
 
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAEEffective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE360 BSI
 
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...360 BSI
 
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...360 BSI
 
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAE
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAEEffective Technical Report Writing 05 - 06 October 2016 Dubai, UAE
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAE360 BSI
 

Plus de 360 BSI (20)

Information Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big DataInformation Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big Data
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAEEffective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
 
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAEEffective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
 
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
 
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
 
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAEAdvanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
 
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
 
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
 
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAEEffective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
 
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
 
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
 
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAE
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAEEffective Technical Report Writing 05 - 06 October 2016 Dubai, UAE
Effective Technical Report Writing 05 - 06 October 2016 Dubai, UAE
 

Dernier

VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 

Dernier (20)

VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 

Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala Lumpur Malaysia

  • 1. 1 YOUR INTERNATIONAL COURSE FACILITATOR Dr Mark T. Edmead MBA, CISSP, CISA, CompTIA Security+ IT Security Consultant & Trainer MTE Advisors Mark T. Edmead is a successful technology entrepreneur with over 28 years of practical experience in computer systems architecture, information security, and project management. Mark excels in managing the tight-deadlines and ever changing tasks related to mission-critical project schedules. He has extensive knowledge in IT security, IT and application audits, Internal Audit, IT governance, including Sarbanes-Oxley, FDIC/FFIEC, and GLBA compliance auditing. Mr. Edmead understands all aspects of information security and protection including access controls, cryptography, security management practices, network and Internet security, computer security law and investigations, and physical security. He has trained Fortune 500 and Fortune 1000 companies in the areas of information, system, and Internet security. He has worked with many international firms, and has the unique ability to explain very technical concepts in simple-to-understand terms. Mr. Edmead is a sought after author and lecturer for information security and information technology topics. Mark works as an information security and regulatory compliance consultant. He has: • Conducted internal IT audits in the areas of critical infrastructure/ systems and applications, • Assessed and tested internal controls of critical infrastructure platform systems (Windows, UNIX, IIS, SQL, Oracle) • Assessed and tested internal controls of various critical financial applications. • Prepared risk assessments and determined risks to critical financial data systems and infrastructure components. • Created test plans & processes and executed test plans. • Conducted reviews of existing systems and applications, ensuring appropriate security, management and data integrity via control processes. • Prepared written reports to all levels of management • Participated in audit review panel sessions to address results, conclusions and follow-up actions required. Tel: +6016 3326360 Fax: +603 9205 7779 kris@360bsigroup.com • c c • • a a • • r Tel: +6016 3326360 Fax: +603 9205 7779 kris@360bsigroup com 1. Bring your Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) for private consultation review 2. BCP/DRP Step-by-step Guide 3. BCP/DRP templates and worksheets to aid you in applying and putting into practice what you have learned from this workshop 4. FREE copy of the course material, case studies, and other related items of the training workshop 1.1. BBriringng yyouourr BuBusisineness private consultation rev EXCLUSIVE: titinunuitityy PlPlanan/D/Disisasasteterr ReRecocovvery iew ssss CConon on rev :: TEMPLATES & TAKEAWAYS Sample Case Studies: • A major Middle Eastern bank has been experiencing tremendous growth and management feels that their current BCP and DRP plans outdated. In this case study the delegates with perform a business impact analysis, based on interviews with key company stakeholders and subject matter experts, and outline which business areas are the most critical and in need of improved continuity and recovery plans. • A manufacturing company is considering implementing a disaster recovery plan but does not know which disaster recovery approach they should implement. In this case study the delegates with study the business enterprise, perform a risk analysis, and determine if a hot site, cold site, warm site, or another disaster recovery method is the best approach. Using a carefully selected case study, course participants will: • Create, document and test continuity arrangements for an organization • Perform a risk assessment and Business Impact Assessment (BIA) to identify vulnerabilities • Select and deploy an alternate site for continuity of mission-critical activities • Identify appropriate strategies to recover the infrastructure and processes • Organize and manage recovery teams • Test and maintain an effective recovery plan in a rapidly changing technology environment BENEFITS OF ATTENDING Disasters could cripple your organization, suspending mission-critical processes and disrupting service to your customers. These disasters could be man-made or natural in nature. The Business Continuity Plan addresses an organization’s ability to continue functioning when normal operations are disrupted. A Disaster Recovery Plan is used to define the resources, action, tasks, and data required to manage the business recovery process in the event of a disaster. In this workshop you learn to identify vulnerabilities and implement appropriate countermeasures to prevent and mitigate threats to your mission-critical processes. You will learn techniques for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation. COURSE OVERVIEW IT SERIES 02 - 04 DECEMBER 2013 GRAND MILLENNIUM KUALA LUMPUR MALAYSIA BUSINESS CONTINUITY & DISASTER RECOVERY PLANNING EXCLUSIVE TAKEAWAY For early bird bookings before 18-OCT-2013 FREE 1 Year Affiliate membership (worth £75) with the Business Continuity Institute (** refer to page 3 for further details)
  • 2. 2 WHO SHOULD ATTEND Vice Presidents, Directors, General Managers Chief Information Officers Chief Information Security Officers Chief Technology Officers Business Continuity Officers Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Disaster Recovery WHY THIS EVENT The aim of this interactive workshop is to provide you with the skills critical to business continuity, disaster recovery & risk management. After attending this workshop, you will leave fully armed with the knowledge needed to create a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation. The combination of interactive presentations, hands-on exercises and open discussion groups along with real case studies, ensures you will obtain maximum value from attending. DAY2 RISK ASSESSMENT & RECOVERY The Business Impact Assessment (BIA) - What is a Business Impact Assessment? - Assessing the risk to the enterprise - How to identify business critical activities - Impact versus likelihood of occurrence Establishing the Recovery Options - Choosing a recovery site - Specifying equipment - Choosing suppliers - How to select backup and restore strategies Where is the data? - Why you need to classify levels of information - Managing data at rest and in transit - Understanding data access controls - The value of knowing where your data resides Maintaining user connectivity - How to communicate the disaster and recovery efforts to users - How to identify and eliminate single points of failure - Communicating with the media DAY1 BCP/DRP - CONCEPTS & PRINCIPLES Introduction to Business Continuity and Disaster Recovery Planning - The difference between business continuity and disaster recovery - Why a recovery plan is an integral part of an organization’s operational strategy Understanding where the threats come from - Understanding codes of practice and legal/regulatory compliance requirements - The step-by-step process for BCP/DRP Protecting our assets - What are we protecting? - What are our mission-critical processes? - How to prioritize what is important to protect What is risk and how do we deal with it? - Understanding risk assessment methodologies - Matching the response to the threat based on the risk - Enterprise vs. local risk management - Top business continuity planning mistakes The need for business continuation – a case study - Introduction of fictitious business case - Understand business continuity/disaster recovery needs - Documenting the continuity requirements COURSE CONTENT
  • 3. 3 COURSE SCHEDULE 8.00 8.30 10.10 - 10.30 12.00 - 13.00 14.40 - 15.00 16.00 Registration & Coffee/Tea Workshop commences Morning coffee/tea Lunch Afternoon coffee/tea End of day “Session well organized. The trainer is very conversant with the subject matter. Well delivered and would definitely recommend to anyone else.” - Habil Mutende, Manager Information Security & Change Management, Central Bank of Kenya “Excellent presentation, excellent attitude to answer our questions & to share his experience.” - Senior Manager, IT Department, Deloitte “I have used Mark in key roles with high visibility clients. Without hesitation I would highly recommend Mark for any and all IT audit engagements. His professionalism, deep knowledge, and results oriented work style are deeply valued by not only myself, but more importantly by the all those who are lucky enough to use his services.”- Russ Aebig, Director at Artesient “We have used Mark Edmead on several projects in the past few years including SOX readiness for publicly traded companies and IT vulnerability assessments for major financial institutions. He always delivers professional and detail-oriented workpapers on-time and within budget. Mark is highly recommended and we will continue to use him on other projects.”- Brenda Piazza, Director at CBIZ MHM 1 3 2 4 “Session well organized The trainer is ver1 Latest TESTIMONIALS Affiliate members to Business Continuity Institute get access to the following membership benefits: - Continuity magazine – 4 per year (digital version) - Monthly BCI ENewsletter - Access to‘member only’section of BCI website - Access to copies of BCI Workshop Reports - Member rates on BCI products and services - Networking opportunities at BCI organised events - Access to BCI mentoring programme - Access to discounted events AffiAffililiatatee memembmbererss toto BBususininesesss CoContntininuiuityty IInsnstititututete ggetet aaccccesesss toto tthehe ffolollolowiwingng mmemembebersrshihipp benefits: **Affiliate membership to Business Continuity Institute DAY3 PROJECT MANAGEMENT & REVIEW BCP/DRP Project Management - Identifying stakeholders - Analyzing stakeholder needs - Obtaining commitment from upper management Review of the BCP/DRP Process - Project initiation - Risk analysis - Business Impact analysis - Develop/choose strategies - Test and validate the plan - Modify/update the plan - Approve and implement the plan Analysis of fictitious business case Applying lessons learned COURSE CONTENT
  • 4. PAYMENT DETAILSFEES 4 OTHER RELATED PUBLIC COURSES IT Strategic Planning Service Oriented Architecture (SOA) IT Risk Management & Leadership Preparing for the CISSP exam Cybercrime & Fraud Investigation IT Change Management IT Project Management 360 BSI is passionate about providing strategic IT programs and high potential training solutions across the region to build personal competencies and organizational capability. You will receive practical training from a professionally qualified educator with over twenty years of teaching and training experience. Please feel free to mix-and-match topics from the areas listed below to get the right training content for your staff. Other topics may be available upon request. IN-HOUSE TRAINING Thank you for your registration! * Save up to 50% for In-house Training program Substitutions are welcome at any time. Please notify us at least 2 working days prior to the event. All cancellations will carry a 10% cancellation fee, once a registration form is received. All cancellations must be in writing by fax or email at least 2 weeks before the event date. Cancellations with less than 2 weeks prior to the event date carry a 100% liability. However, course materials will still be couriered to you. General Information: 1 2 3 4 5 Cancellations/Substitutions Payment is required within 5 days upon receipt of the invoice. All payments must be received prior to the event date Hotel Contact Details: Fax: +603 9205 7779 Tel: +603 9205 7772 Mobile: +6016 3326 360 Email: kris@360bsigroup.com REGISTRATION FORM 360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL, 168 Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia.© www.360bsi.com/IT Name Name on tag Job Title Email Mobile : : : : : Name Name on tag Job Title Email Mobile : : : : : Name Name on tag Job Title Email Mobile : : : : : 1 2 3 DELEGATES AUTHORIZATION (This form is invalid without a signature) Name : Job Title : Email : ( )Tel : Organization : Address : Signature : Date: / / USD 6,600- Special for Group of 3 USD 2,495 per delegate - register before 18-OCT-2013 USD 2,695 per delegate Bank transfer: 360 BSI MIDDLE EAST LIMITED Abu Dhabi Commercial Bank Dubai Mall Branch, P.O.Box 49124 Dubai, U.A.E Account No: 10065721319001 Swift No: ADCBAEAAXXX IBAN No: AE780030010065721319001 The fee does not include any taxes (withholding or otherwise). In case of any taxes applicable the client has to ensure that the taxes are paid on top of the investment fee paid for the course. Compliance with the local tax laws is the responsibility of the client. 02 - 04 DECEMBER 2013 GRAND MILLENNIUM KUALA LUMPUR MALAYSIA Registrations close ONE (1) week before the training dates. The fees cover lunch, tea breaks, materials and certificate. Official confirmation will be sent, once registration has been received. Participants will need to arrange their own accommodation. Attire: Smart Casual For Room Reservation, please contact Reservation Desk. Tel: +60 3 2117 4899 Fax: +60 3 2142 1441 Grand Millennium Kuala Lumpur 160, Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia. BUSINESS CONTINUITY & DISASTER RECOVERY PLANNING