Hi [[ session.user.profile.firstName ]]

Certified Information Security Manager

Learn more about ISACA's industry leading certification for information security manager.
Recorded Oct 14 2008 22 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Smita Totade, CISA, CGEIT, CISM
Presentation preview: Certified Information Security Manager

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Can compliance be less costly? Recorded: Jun 9 2010 61 mins
    Renee Murphy; fyoozhen Consulting, Founder and Principal Consultant & Paul Stamp; RSA, Senior Manager Product Marketing
    Because it cuts across business functions, systems and processes, compliance is one of the most complex and costly challenges facing IT functions. Is your organization, like so many, struggling with reactive, fragmented compliance projects, non-integrated technology investments, manual processes and duplicated effort?

    In this session Renee Murphy, Founder and Principal Consultant of fyoozhen Consulting & Paul Stamp, Senior Product Marketing Manager at RSA, The Security Division of EMC, will focus on real examples of organizations that are consistently and cost-effectively enforcing IT compliance across multiple geographies and business lines. We'll also show you how doing so helps them minimize security vulnerabilities and frees them from time-consuming manual processes to spend more time adding value to their businesses.

    You'll learn that it's possible to:

    • Automate many compliance-related processes and workflows, including the creation of real-time reports and dashboards tailored to different business audiences

    • Eliminate duplication of effort and investment by satisfying multiple regulations with a small number of controls and applying policies consistently across organizational areas and common regulatory requirements

    • Keep track of changing compliance requirements and quickly understand their implications for your policies and controls
  • GRC made Practical - Methodologies and Frameworks Recorded: Nov 17 2009 45 mins
    Robert Stroud, International VP of ISACA
    This session will deliver you an introduction the ISACA COBIT, VALIT and RISK IT frameworks and how to commence a practical GRC journey using them together to provide effective governance.
  • Implementing and Continually Improving IT Governance Recorded: Nov 17 2009 49 mins
    John W. Lainhart IV; IBM Global Business Services - Public Sector, Partner
    This session will focus on the new ISACA guide for implementing and continuing improving the Governance of IT within organizations. It will address the positioning of IT governance within the enterprise governance framework and how important it is to create the right environment for successful governance of IT. It will introduce the IT Governance lifecycle and discuss implementing the lifecycle, pain points, trigger events and challenges to success. Also, covered will be enabling change and managing the program. Finally, it will discuss the use of guidance such as CobiT, Val IT and Risk IT for achieving good practices in IT governance.
  • The Economics of Security Recorded: Sep 8 2009 41 mins
    John T. Parker: McAfee Product Line Executive
    It’s not easy to keep an enterprise successful and secure these days. Organisations all over the world are faced with a host of challenges: an unsteady economy, growing competition, volatile global markets, shrinking budgets, and consumer uncertainty. Added to that, the growing threats that can easily outwit point solutions with a combination of web 2.0 technologies, encryption, sophisticated spam techniques and phishing attacks. John will take us through McAfee's Global Threat Management technologies which can instantly detect and block multifaceted attacks that attempt to enter your network, simplifying the process for your organisation. He will also discuss some critical requirements to consider as you look at ways to reduce costs and streamline security management processes through a consolidated network portfolio, simplified administration and centralised management via ePO.
  • Governance in Cloud and Virtualized Environments Recorded: Aug 17 2009 121 mins
    Jon Stokes; Ars Technica and Karen Worstell; W Risk Group, LLC
    This is a introduction to Cloud and Virtual environments for ISACA members. Join Ars Technica/Sun/Intel as they give an overview Cloud Computing and Virtualization and then an ISACA speaker will discuss the GRC and security management considerations in Cloud and Virtual environments.
  • Research Results: Enterprise Benefits & IT Governance Frameworks Recorded: Jul 9 2009 83 mins
    James Hurley; Symantec & Robert Stroud; ISACA
    Research Results: Enterprise Benefits & IT Governance Frameworks
  • Regaining Control over the Application-Centric Network Recorded: Jun 9 2009 86 mins
    Patrick Sweeney from SonicWALL and Rafal Los from HP
    Welcome to this ISACA event, sponsored by SonicWALL. The speakers for this live webcast will be discussing how network and application usage is dramatically changing the way networks are designed, managed and protected. Bandwidth is increasing and users are becoming more technically savvy as they strive for greater productivity. At the same time, the growth of insecure Web 2.0, Software as a Service (SaaS), Service Oriented Architecture (SOA), social networking, Peer-to-Peer (P2P) applications and streaming media has increased the need for greater traffic inspection. Firewall-evasive techniques, convergent online information and port-hopping have added new opportunities for the spread of malicious content and code.

    Traditional approaches to network infrastructure are failing to meet the combined demand for unrestricted throughput, deep security and granular control. In most cases, the need for throughput has won out, and security, control and employee productivity have been compromised.

    Join this web seminar to learn:

    -The mounting security implications of an application-centric network
    -How to manage application diversity and bandwidth growth.
    -Best practices in regaining control over network traffic
    -How to regain control without compromising network performance.
  • Understanding FISMA Recorded: Jan 20 2009 23 mins
    Meenu Gupta, CISA, CISM, CISSP, CIPP / President, Mittal Technologies
    The E-Government Act (Public Law 107-347) passed by the 107th Congress and signed into law by the President in December 2002 recognized the importance of information security to the economic and national security interests of the United States. Title III of the E-Government Act, entitled the Federal Information Security Management Act (FISMA) requires each federal agency to develop, document, and implement an agency-wide program to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source.
    This presentation will provide a brief synopsis of the federal initiatives designed to enhance the security of the US federal information systems and the critical role NIST (National Institute of Standards and Technology) plays in setting standards designed to achieve FISMA compliance.
  • IT Governance - Taking You to the Next Level Recorded: Nov 18 2008 25 mins
    Robert Stroud
    An overview of IT Governance focus areas and control cycles.
  • Certified in the Governance of Enterprise IT Recorded: Oct 14 2008 22 mins
    Howard Nicholson, CGEIT, CISA
    Learn more about ISACA's industry leading certification in the governance of Enterprise IT.
  • Certified Information Security Manager Recorded: Oct 14 2008 22 mins
    Smita Totade, CISA, CGEIT, CISM
    Learn more about ISACA's industry leading certification for information security manager.
  • Certified Information Systems Auditor Recorded: Oct 14 2008 18 mins
    Richard Brisebois, CISA, CGA
    Learn about ISACA's industry leading certification for information systems auditors.
Trust in, and Value from, Information Systems
Relevant webcasts from industry leaders on assurance, governance and security topics. Also, find need to know information on ISACA certifications and research projects.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Certified Information Security Manager
  • Live at: Oct 14 2008 1:30 pm
  • Presented by: Smita Totade, CISA, CGEIT, CISM
  • From:
Your email has been sent.
or close