Module 13: Information Security Program Resources
- Introduction to Security Program Development and Management
- Information Security Program Objectives
- Information Security Program Concepts
- Common Information Security Program Challenges
- Common Information Security Program Constraints
Module 14: Information Asset Identification and Classification
- Information Asset Identification and Valuation
- Information Asset Valuation Strategies
- Information Asset Classification
- Methods to Determine Criticality of Assets and Impact of Adverse Events
Module 15: Industry Standards and Frameworks for Information Security
- Enterprise Information Security Architectures
- Information Security Management Frameworks
- Information Security Frameworks Components
Module 16: Information Security Policies, Procedures, and Guidelines
- Policies
- Standards
- Procedures
- Guidelines
Module 17: Information Security Program Metrics
- Introduction to Information Security program Metrics
- Effective Security Metrics
- Security Program Metrics and Monitoring
- Metrics Tailored to Enterprise Needs
Module 18: Information Security Control Design and Selection
- Introduction
- Managing Risk Through Controls
- Controls and Countermeasures
- Control Categories
- Control Design Considerations
- Control Methods
-
Module 19: Information Security Control Implementation, Integration, Testing, and Evaluation
- Introduction
- Baseline Controls
- Introduction
- Control Strength
- Control Recommendations
Module 20: Information Security Awareness and Training
- Security Awareness Training and Education
- Developing an Information Security Awareness Program
- Role Based Training
Module 21: Management of External Services
- Governance of Third-Party Relationships
- Third Party Service Providers
- Outsourcing Challenges
- Third-Party Access
Module 22: Information Security Program Communications and Reporting
- Program Management Evaluation
- Plan-Do-Check-Act Cycle
- Security Reviews and Audits
- Compliance Monitoring and Enforcement
- Monitoring Approaches
- Measuring Information Security Management Performance
- Ongoing Monitoring and Communication