COMPUTER BUSINESS REVIEW

Critical. Authoritative. Strategic.

TECHNEWS

CBR is proudly produced & published
by Technews
www.technews.co.za
Issue Date: October 2007

ISMP made easy with Foster-Melliar

25 October 2007

In a world where information security is no longer an option but a standard, Foster-Melliar a wholly owned subsidiary of Simeka BSG offers an Information Security Management Principles (ISMP) training course, focusing on the effective implementation of solid management principles in an information security environment.
"Information security courses traditionally focus on security hardware and software, but Foster-Melliar shifts the focus to the management principles involved in the effective and thorough management of information security risk," says Brian Townsend, MD of Foster-Melliar.
ISMP is an internationally recognised qualification underpinned by the Information Systems Examinations Board (ISEB). "Successful delegates obtain ISEB's certificate in information security management which greatly enhances an individual's professional career by providing both the means and the platform for recognition and focused career development."
The course has been successfully presented by Rodney Clark for the past five years, a UK-based information security consultant and certified ISEB trainer. Foster-Melliar has since however obtained registration as a certified training provider for ISEB's ISMP course, making Foster-Melliar one of only a handful of companies capable of making this claim in the world.
The course will continue to be offered and presented in the same way as it always has but possibly with a more local flavour, in addition to increasing the frequency at which the course is offered as accredited trainers are more readily available.
ISMP is highly recommended for business and information systems managers, IT managers, project managers, auditors, compliance officers and small business managers whom are involved in any form of information security management.
The 5-day course is focused on information security and starts by defining the need for it through to identifying the threats involved. It introduces delegates to the use of risk assessments, the development of structures in addition to giving a legal framework in which the industry operates (ISO27001 and ITSEC scheme). It also guides candidates through the implementation of security measures as well as understanding the privacy of personal data in addition to looking at encryption and digital signatures.
Security issues related to networks, the World Wide Web and new technologies such as VOIP is also addressed and rounded off with the tools for the development of a comprehensive business continuity plan.


Others who read this also read these articles

Search Site





Search Directory

  • Search for:





Subscribe

Previous Issues