Leader in the cybersecurity training sector.

Becoming an Information Systems Security Manager (ISSM)

Satisfaction rate
4.8
Success rate
4.9
Develop your knowledge of ethical hacking and IT security; improve your hacking skills and perfect your knowledge of the most advanced IT security techniques.

The target audience for training

  • Business or IT managers wishing to become CISOs
  • Operational CISOs wishing to understand the new missions of the CISO

 

What you will learn

The protection of information and the security of information systems are now so important that those responsible for information systems security must be increasingly involved in the governance processes of the company or organisation. The role of the CISO is essential, as he or she is responsible for actions relating to the protection of information and the security of the company's systems, networks, applications and data. This course, illustrated by a number of practical case studies, will provide participants with all the key best practices they need to master the dimensions of this job.

Training programme

  • What are the challenges of ISS?
    • Some basic definitions, scopes and terminology
    • The challenges of information security
    • The nature of threats and risks Initiating penetration testing
  • The missions of the CISO
    • Advising General Management on legal obligations and ISS risks
    • Formalise a strategy and define an action plan
    • Defining an SSI repository
    • Participate in setting up the governance structure
    • Advising and assisting project owners in risk management
    • Advising, assisting and supervising project managers in dealing with risks
    • Training, raising awareness
    • Proactive monitoring
    • Auditing and carrying out compliance checks and measuring effectiveness
  • Legal obligations and SSI requirements
    • Liability in tort and contract
    • Legal obligations
    • PPST: Protection of information relating to the nation's technical potential
    • Respect for privacy / Secrecy of correspondence
    • GDPR
    • Law for a digital republic
    • SOX: Sarbanes Oaxley
    • LSF: Financial Security Act
    • LCEN: Law on Confidence in the Digital Economy
    • LSQ: Loi Sécurité Quotidienne / Godfrain Law
    • CPI: French Intellectual Property Code
    • The directive "Network and Information Security
    • LMP: Military Planning Law
  • Identification of competent authorities and reference systems
    • ANSSI, PSSI x, RGS
    • French Agency for Digital Health
    • PCI DSS
    • CNIL
  • Contracts
  • ISS governance
    • SSI maturity levels and types of organisation
    • The steering, arbitration, monitoring and certification committee
    • Hierarchical and functional channels
    • Links with other sectors (hierarchical, facility safety, crisis management, etc.)
    • Incident notification and alert management
  • Formalising an IS strategy
    • Adding tools and best practice
    • Issue-oriented
    • ISMS-oriented
    • The stages in formalising a roadmap
  • Risk management
    • The ISO 31000 standard
    • The ISO 27005 standard
      • Assisting the project owner in assessing needs and feared events
      • Assistance to project managers in dealing with risks
      • Advice on validation or certification
    • Case studies
    • The ISO 27002 standard
    • The ISO 27001 standard
  • Definition of an SSI reference system
    • Letter of commitment from management
    • Letter appointing the CISO
    • General information protection policy
    • How to build an information system security policy
    • Charters
    • Guides and procedures
    • Exercises
  • Implementation of an SSI integration method in projects
    • EBIOS
    • Adapted
  •  
  • The state of the art in technical solutions for information system security
    • Access security
      • Network filtering
      • Application filtering
      • Authentications
      • Approvals
      • Intrusion detection
      • Journalisations
      • Supervision
    • Trade security
      • Symmetric and asymmetric encryption
      • Public Key Infrastructure
      • Declinations
    • Trade security
      • Symmetric and asymmetric encryption
      • Public Key Infrastructure
      • Declinations
    • Server security
      • Hardening
      • Hosting
    • Safety at sedentary and mobile workstations
    • Application security
  • SSI architectures
    • Peripherals
    • In depth
  • Introduction to business continuity plans and contingency plans
    • Business continuity fundamentals
    • The BCI model and the ISO 22301 standard
    • The different plans: PCA, PCO, PSI, PGC, PCOM, etc.
    • The phases of a BCP project
  • Taking the human factor into account
    • Awareness / Training / Communication
    • Exercises
  • SSI legal and technical monitoring
  • Control and audit
    • Definition of control indicators
    • Formalising audits
    • Intrusive testing
    • Formalising and updating dashboards
    • Exercises
  • General advice for success as a CISO
    • Obstacles and difficulties encountered by CISOs (feedback)
    • Ensuring that the CISO's role is properly understood and communicated
    • Mistakes not to be made, advice on change management

Training objectives

  • Identify all the facets of the IS Security Officer's job, his role and responsibilities

  • Building an effective safety policy and managing AIS risks Having an overview

  • technical IS protection measures

  • Have a methodology for implementing and monitoring safety

  • Knowing what best practice is for building your action plan and defining your indicators

Training prerequisites

The Fundamentals of Risk Management course (Ref. LFMR) is the ideal prerequisite for this course.

Tarif

3500 €
Book Now

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
1 personne
3500
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "1 personne" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.