Artikel-Schlagworte: „booster“
Schedules 2013
CISA After Work Webinar 7 consecutive Thursdays 6 p.m. till 9 pm.
04.04., 11.04., 18.04., 25.04., 02.05., 09.05. & 16.05.2013.
http://blog.rmpi-germany.de/?event=cisa-after-work-webinar-7-consecutive-thursdays-6-p-m-till-9-pm
CISA Refresher Webinar 23.05., 30.05. & 31.05.2013 6 p.m. till 9 p.m.
http://blog.rmpi-germany.de/?event=cisa-online-refresher-class
All times are local time (Amsterdam, Berlin, Vienna …)
Anmeldung/Register CISA und CISM Seminare / CISA & CISM Classes onsite and online (Webinar)
http://rmpi-austria.co.at/CISA_und_CISM_Seminare_2013.pdf
ISACA NY Metro Chapter Spring 2013 – CGEIT Exam Preparation Global Webinar (Live only)
ISACA NY Metro Chapter Spring 2013 – CISM Exam Preparation Global Webinar (Live only)
“Where Theory is put into Practice.” Series
How Single Sign On is Changing Healthcare
08/04/2013 & 10/04/2013
http://blog.rmpi-germany.de/?event=how-single-sign-on-is-changing-healthcare
Change Management as an integral part of Project Portfolio Management
(Programme Management – UK Terminology)
06/05/2013 & 08/05/2013
http://blog.rmpi-germany.de/?event=change-management-as-an-integral-part-of-project-portfolio-management
Mag. Jutta Edith Staudach
Brunecker Strasse 2e – Europahaus
A-6020 Innsbruck
Landline: +43.512.562055-22
Cell: +43.699.18297207
CISM Booster Course – Live from Innsbruck & Ljubljana
Live from Innsbruck & Ljubljana
2nd of October 2012 4:30 pm. till 8:30 p.m.
The CISM Booster Course:
“Where Theory is put into the Practice.”
Who? Being a CISM means you cover various socio-technical domains. You manage organization’s information security efficiently, effectively and aligned with business objectives … at least in theory.
What? Indeed, these outcomes are hard to realize, when you are suddenly faced with a real project. Practical problems[1] already arise at the very beginning of InfoSec program development. However, satisfactory solutions cannot be found in CISM theory nor are described in existing literature.
Why? The project success or failure is based on Senior Management Commitment and to get this is based on your experience, but we know, these are hard to get.
As we are aware of these issues, we can help you to advance.
How? We will put the theory into the practice on the example of an identity management system[2] rollout case. A unique opportunity to learn (only this time, ***FREE OF CHARGE***):
CISM Aligned Real-Life Case.
Based on Identity Management System Rollout.
Complete: From Mandate Acquired to Lessons Learned.
Don’t Reinvent the Wheel: Do’s, Don’ts, Caveats and Pitfalls.
Best Practices to Save Money and Time.
Study Support for CISM Final Exam (aligned with CISA, CRISC & CGEIT).
Register – http://www.anymeeting.com/PIID=E150DC888149
Instructors:
Theory 1h: Security Program Development & Management
Jutta Staudach, CISA, CISM, Mag. – Consultant
Practice 3h: Identity Management SSO Rollout Case
Iztok Starc, Mag. – Teaching Assistant University of Ljubljana
https://www.xing.com/profile/Iztok_Starc
Jutta Staudach, CISA, CISM, Mag. – Consultant
https://www.xing.com/profile/JuttaEdith_Staudach
4 CPE as per rule
[1] How to begin? How to develop and manage information security program in a real environment?
[2] Identity management /w Single Sign-On, see http://en.wikipedia.org/wiki/Identity_management