Making a Case for an Information Security Management System

This course equips you to develop a watertight plan and then gain the buy-in and funding you need to execute it.

What you’ll learn:

  • The components that help to build a compelling information security management plan
  • How to understand, assess and document risks relevant to your organisational environment
  • The ethical considerations of information security and increasing security controls
  • The vital role that robust information security governance plays.
  • How to communicate your plan effectively to gain support.

Course overview

Course content

  • The information security management system
    Learn about the standards for information security management systems and the benefits of having one
  • Building your case for an information security management system
    Discover what to include when building your case
  • Identifying and assessing risk
    Explore the key considerations to include in a risk assessment for an information security management system
  • Ethical considerations of information security management
    Delve into the behaviours and considerations that are important to an ethical approach
  • Information security governance
    Discover the key policies, standards and guidance involved in information security governance
  • Communicating your case
    Find out how to present your case effectively and the role that emotional intelligence can play
£36.00
£36.00

Earn a digital badge upon completion

Set up a BCS account to access the course

This course will suit you if you are involved in information security or IT projects. It will be particularly useful if you have – or want to have – one of these roles:

  • IT Security Specialist
  • Security Manager
  • Security Engineer
  • Information Security Analyst
  • Security Administrator
  • Network Security Engineer
  • Machine Learning Engineer

 

Protecting your organisation’s information and systems relies on a comprehensive and proactive strategy. However, securing decision makers’ support to implement security controls can be a challenge.

At the end of the module, you’ll be able to put your knowledge to the test and gain a digital badge which you can use to prove that you’ve successfully completed your training.