Information Technology

Why Choose this Training Course?

Information is the lifeblood to all organisations, without with it would be severally impacted and ultimately cease to function. Information is knowledge and knowledge is power. With an ever changing climate of technology and threats (both technical and human), the need for trained security personnel to protect our information becomes increasingly critical evolutionary task.

Information is at risk from many sources, legal, electronic, physical, internal and external to mention a few. It is paramount that security and related management personnel have an understanding of the risks, controls and countermeasures that are available to secure information and technology within an effective management framework. Furthermore utilising countermeasures, best practice and management techniques will mitigate electronic and physical risks and enhance protection to an organisation.

What are the Goals?

On successful completion of the seminar, delegates will be able to have:

  • Knowledge of the concepts relating to information security management (confidentiality, integrity, availability, vulnerability, threats, risks, counter measures, etc).
  • Understanding of current legislation and regulations which impact upon information security management.
  • Awareness of current national and international standards such as ISO 27002, frameworks and organisations which facilitate the management of information security.
  • Understanding of the current business and common technical environments in which information security management has to operate.
  • Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.

Who is this Training Course for?

The seminar has been designed for individuals responsible for Risk Management, IT Security and IT Security Auditing, Technical IT Management and those with involvement of systems integration and corporate IT development. Financial controllers with a technical interest may also benefit from the seminar.


How will this Training be Presented?

Participants will gain detailed knowledge by active participation in seminars, group discussions and real life case studies.

Delivery will be by presentation, group syndicate investigations, training DVD and interactive seminars.

B.  Business Continuity Management & IT Disaster Recovery

How to Protect your Business and Bottom line

Why Choose this Training Course?

This highly interactive course is about building and improving resilience in your organisation; it’s about identifying your key products and services and the most urgent activities that underpin them and then, once that ‘analysis’ is complete, it is about devising plans and strategies that will enable you to continue your business operations and enable you to recover quickly and effectively from any type disruption whatever its size or cause. It gives you a solid framework to utilise in times of crisis and provides stability and security (Business Continuity Institute).

In fact, embedding BCM & DR into your organisation is proven to bring additional benefits to you and your business. The key to a swift recovery is time; the organisation which recovers in the shortest possible time will mitigate its losses to the optimum.

This Course will Feature:

  • All ten stages of the BCM Life Cycle using ISO22301
  • Proven techniques to assess and reduce risk and impact
  • How to construct and maintain effective BCM and DR plans
  • International best practice of BCM and DR
  • Explanation of the 24 international standards on IT Security
  • Preparation for the Certificate of the BCI examination


What are the Goals?

By the end of this Course, participants will be able to:

  • Develop threat & vulnerability assessments (Business Impact Analysis)
  • Identify and select cost-effective strategies for critical functions
  • Solid understanding of BCM & IT DR “Best Practices & Principles”
  • Design exercises to coordinate Crisis Management with DR
  • Understand how to maintain support & commitment for the programme


Who is this Training Course for?

This course is designed for all levels of management and business unit staff who are involved in or have been given the responsibility of business continuity planning, disaster recovery and emergency response functions.  This course is suitable to a wide range of professionals but will greatly benefit:

  • Business Continuity Professionals
  • Emergency Response & Crisis Management Team Members
  • Security Professionals
  • Operation & Control Room Managers
  • Those responsible for effective administration and preparedness
  • IT and telecommunication managers
  • Internal and external auditors


How will this Training Course be Presented?

This course will utilise a variety of proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented. This includes a comprehensive manual and USB stick containing all course text, hand-outs, slides and case studies for each delegate.

The course content covers all 10 stages of the BCM Life Cycle, utilising lively discussion, case studies, relevant DVD material and group exercises. It is a practical, ‘lessons learned’ event which trains participants in “best practices” as well as “best principles” for BCM.

Information Technology