Management of Information Security and RiskCity University London
Precio a consultar
- Islington (Inglaterra)
¿Qué aprendés en este curso?
Skills and Training
Led by the internationally respected Centre for Software Reliability, the course is delivered with the multidisciplinary Centre for Cyber Security Science and Cass Business School. The course is aimed at IT professionals with around five years' experience. It covers the skills and knowledge necessary to be successful in senior roles in information security and risk.
The course supports the extra breadth of knowledge required by people with professional experience to progress towards target roles in management or consulting on security, assurance and risk. This extra breadth is in the directions of:
- principles of security and resilience
- understanding of risk as a socio-technical rather than technical issue
- a common framework for considering risks with technical and human, accidental and malicious causes
- analysis of assurance (systems and policies) beyond mere compliance with standards and rules
- as well as professional development and leadership
Modules providing Professional Skills:Information Leadership
- The role of the CIO/information leader past, present and future
- Relationships with key executive posts such as CEO, COO, CFO
- Talent management: the information leader's team, key IT functional roles and technology specific issues
- Financial context: budgeting, corporate/public sector financial reporting, balance sheets, cash flow, income/expenditure, etc. Management accounting issues
- Purchasing, third-party and customer/supplier management
- Introduction to IT governance, legal/regulatory issues and the role of policy and standards
- Information as a source of competitive advantage: when IT does and doesn't matter.
- Competency frameworks, qualifications and CPD, including; IISP, SFIA, ITIL, BCS and industry certifications
- Personal SWOT analyses and action planning
- Developing behavioural competencies in an organisational context; leadership, team working, communication, negotiation, and influencing
- Reflection, performance appraisal, mentoring and coaching
- Project, programme and change management in uncertain environments
- Communities of practice and professional identity.
- The concept of socio-technical system; examples of errors caused by technical-only analysis of IT based systems
- Introduction to Human Factors, cognitive processes, assessment of human performance and human error
- Unexpected effects of automation on work organisation, behaviour and performance
- The psychology of risk perception and communication
- Models and empirical studies of responsibility, trust and trustworthiness
- Psychology of security and social engineering attacks
- Organisational factors: roles of culture and incentives
- Approaches to the study of risk and risk management in socio-technical systems: "Normal accidents", "High reliability organisations", "Resilience engineering".
- The assurance gap - how to identify the black hole between the Board's understanding of the governance of the organisation and the operational reality
- IT Risk Management - how to ensure that IT risks are part of the enterprise risk management process
- IT Audit - the multi-layered approach to identifying the effectiveness of controls over the systems life cycle, the operational efficacy and the security of the IT resource
- IT Governance - demonstrating the need for transparency and integration of the IT resource
- Continuous Monitoring and Continuous Audit - the new dynamic - providing assurance that events - specifically IT related events - are controlled in real time - or close to real time
- Best Practice IT workshop including case studies showing the causes of major IT failures
- Prevention of Fraud, denial of service.
Specialized Security and Risk Modules:Information Security Management
- Information Security in the 21st century, evolving threats and defences
- Security policies and governance; Role of standards, guidelines and legislation
- Communicating security and risk issues to general and executive audiences
- Selecting and evaluating strategies and technologies for organization wide security.
- Basic concepts, definitions and types of requirements in dependability, security, resilience including reference to the relevant international standards and adopted good practices
- Systematic methods for identifying vulnerabilities and threats; basic concepts and examples about means for achieving resilience and security: avoidance, prevention, removal, mitigation and recovery at the technical and at the organisational levels
- Fundamental design trade-offs in formulating information security/resilience strategies; introduction to the means for assessing dependability and resilience and information assurance methodologies
- Basic concept of the risks due to the interdependencies between critical infrastructures (i.e. power grid reliance on telecommunication and vice versa, etc.) and methods of its quantification and management (interdependency analysis).
- Quantifying risk. Probabilistic models. Statistical inference
- Subjective probabilities and Bayesian inference
- Dependent events. Dependent random values
- Worst / best case estimates of probabilities and random values
- Models of defence / protection
- Presenting results of risk analysis
- The nature of the assurance and evaluation problem for computer based systems
- Deriving and structuring of claims in an assurance case; claim expansion from architecture; from dependability attributes.
- The role of standards, policies and regulations in deriving claims and argument strategies
- Evidence and arguments for different attributes
- Reviewing and assessing cases; improving communication. Developing cases for a range of stakeholders - from "boardroom to back office"
- Cases for specific classes of systems. Issues of scalability
- The use of tools for assurance cases (e.g. ASCE).
Students also take an independent individual project, which applies the technical contents of the course to a concrete problem. The project may be executed during an internship in an outside organisation, within a successful internship scheme.
Read the full programme specification
Teaching and Assessment
The modules will be delivered in block mode, with students taking 2 modules per term. Each module consists of two blocks as follows:
- Thursday evening: 5pm - 9pm
- Friday: 9am-5pm
- Saturday: 9am-5pm
Modules can also be taken individually for Continuing Professional Development (CPD).
In summary, assuming attendance at the Thursday evening sessions can be done without having to take any time off from work, the students are expected to take 8 Fridays off from work in a calendar...