Designing a GRC Framework

Presented by

Richard Hollis, Director, Risk Factory

About this talk

What is the essence of information security governance, risk & compliance? How do you meet your governance, risk and compliance requirements and prevent a data breach? The key is to understand the spirit of risk management and create a customised information security management system (ISMS) for your business. This presentation details a practical, step-by-step guide for designing and implementing a cost-effective ISMS to minimise your risk of a breach and meet your Association’s legislative (Data Protection Act), regulatory (Payment Card Industry), or industry standard (ISO-27001) compliance requirements to include: · Practical ISMS documentation structure · Scope, objectives & risk strategy examples · Risk treatment plan, asset register & classification guide examples · Policy frameworks · Control objectives, evidence & policy examples · Audit & testing documentation examples

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13398)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more