The Information Technology (IT) Governance. WA : 0899-8121-246
Daftar SegeraJadwal Training Lengkap 2018
Jadwal Training Pelatihan :

The Information Technology (IT) Governance

The Information Technology (IT) Governance

25-27 Juli 2012

09.00 – 16.30 WIB

Estubizi Business Center
Setiabudi Building 2 Lantai 1
Jl.HR.Rasuna Said ,Kuningan
Jakarta Selatan

Descriptions :
The Information Technology (IT) Governance training is designed  specifically for experienced information security managers and those who have information security management responsibilities. The training  is for the individual who manages, designs, oversees and/or assesses an enterprise’s information security (IS). The IT governance training  promotes international practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management in an enterprise. The course contents are impregnated by standard course recognized by CISA ( Certified Information Security  Auditor)

The course has been designed to enhance the skill of participants in the area of security management, especially in relation to the practice and implementation of IT Governance in their day-to-day operation as related to information security management. The training shall provide the participant  with the following capabilities:

  1. Have thorough understanding of   IT Governance  within the scope of  Information Security Management
  2. Enhanced knowledge and skill in dealing with the operational issues as related to information security within day-to-day installation operation
  3. Enhanced the skill in the design, implement, manage, and asses the organization’s  IT security system by applying the concept and philosophy of IT governance
  4. Prepare individual competency for the  professional exam to enhance the skill of the participants in Information Secuity, and  IT governance as related to Corporate Governance and escalate their  management  proficiency with broad managerial perspective essential for their day-to-day IT security  operation and preparing the skill for IT security management  procedural set up.

On completion of this module, delegates will have a detailed understanding


  1. Good Corporate Governance and IT Governance
    • Information Security Governance
    • Information Risk Management
    • Information Security Program(me) Development
    • Information Security Program (me) Management
    • Information Security Management
  2. Structures, Process & Relational Mechanisms for IT Governance Incident and Response Management
    • An information security steering group function
    • Legal and regulatory issues associated with Internet businesses, global transmissions and trans border data flows
    • Common insurance policies and imposed conditions
    • Information security process improvement
  3. Board of Directors level view of IT Governance
  4. IT Governance Model
    • Recovery time objectives (RTO) for information resources
    • Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels.
    • Security metrics design, development and implementation.
    • Information security management due diligence activities and reviews of the infrastructure.
  5. IT Balance Scored Card/IT BSC and IT Strategy Map
    • Events affecting security baselines that may
    • The requirements for collecting and presenting evidence; rules for evidence, admissibility of evidence, quality and completeness of evidence.
    • External vulnerability reporting sources
    • The key components of cost benefit analysis and enterprise migration plans
    • Life-cycle-based risk management principles and practices.
    • Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels.
    • Security baselines and configuration management in the design and management of required risk assessment
    • Changes to information security requirements in security plans, test plans and re-performance
    • Disaster recovery testing for infrastructure and critical business applications, business applications and the infrastructure
    • Acquisition management methods and techniques
  6. Board of Directors level view of IT Governance
  7. IT Val
  8. IT Governance with COBIT
  9. AS-8015 on Good Corporate Governance for ICT
  10. Cases


  • Chief Information Security Officer (CISO)
  • Chief Information Officers (CIO)
  • Chief Technology Officers (CTO)
  • IS/IT Steering Committee
  • Audit Committee
  • IT Senior Manager
  • Information Security Manager
  • Senior Risk Manager
  • Senior Audit Manager
  • IT & Audit Staff
  • IT Security Staff
  • Risk Management Staff
  • Academic students

Instructor :
DR.IR.Fauzi Hasan, MM, MBA, PMP, CISA, CISSP, SSCP, CISM, CGEIT, CPRC, CSCP, APICS, Cert. , ITIL Expert, Change Management (APMG), Prince2

Registrasi Tidak Mengikat
  1. Judul Training di atas bisa dijadikan sebagai topik INHOUSE TRAINING. Jika Anda membutuhkan bantuan free konsultasi bisa hubungi 0851-0197-2488/ 0899-8121-246
  2. (required)
  3. (valid email required)
  4. (required)
  5. (required)
  6. (required)
  7. (required)
  8. Mohon untuk tidak memesan tiket perjalanan / akomodasi penginapan sebelum ada kepastian training akan berjalan.
  9. (valid email required)
  10. PENTING : Harga dan Silabus Training sewaktu-waktu bisa berubah. Disesuaikan dengan kondisi terakhir. Jadi MOHON baca email PENAWARAN yang dikirimkan dari Mitra Info Seminar

cforms contact form by delicious:days

Silahkan Berbagi :