IMF Academy (International Management Forum)
Fellenoord 2245611 ZC EINDHOVEN


 Enterprise Governance Overview
 Enterprise Governance Overview Organizational Culture, Structures, Roles and Responsibilities
 Organizational Culture, Structures, Roles and Responsibilities Legal, Regulatory and Contractual Requirements
 Legal, Regulatory and Contractual Requirements Information Security Strategy
 Information Security Strategy Information Governance Frameworks and Standards
 Information Governance Frameworks and Standards Strategic Planning
 Strategic Planning Risk and Threat Landscape
 Risk and Threat Landscape Vulnerability and Control Deficiency Analysis
 Vulnerability and Control Deficiency Analysis Risk Assessment, Evaluation and Analysis
 Risk Assessment, Evaluation and Analysis Information Risk Response
 Information Risk Response Risk Monitoring, Reporting and Communication
 Risk Monitoring, Reporting and Communication Information Security Program Development and Resources
 Information Security Program Development and Resources Information Security Standards and Frameworks
 Information Security Standards and Frameworks Defining an Information Security Program Road Map
 Defining an Information Security Program Road Map Information Security Program Metrics
 Information Security Program Metrics Information Security Program Management
 Information Security Program Management Information Security Awareness and Training
 Information Security Awareness and Training Integrating the Security Program with IT Operations
 Integrating the Security Program with IT Operations Program Communications, Reporting and Performance Management
 Program Communications, Reporting and Performance Management Incident Management and Incident Response Overview
 Incident Management and Incident Response Overview Incident Management and Response Plans
 Incident Management and Response Plans Incident Classification/Categorization
 Incident Classification/Categorization Incident Management Operations, Tools and Technologies
 Incident Management Operations, Tools and Technologies Incident Investigation, Evaluation, Containment and Communication
 Incident Investigation, Evaluation, Containment and Communication Incident Eradication, Recovery and Review
 Incident Eradication, Recovery and Review Business Impact and Continuity
 Business Impact and Continuity Disaster Recovery Planning
 Disaster Recovery Planning Training, Testing and Evaluation
 Training, Testing and Evaluation
         U moet over ten minste 5 jaar werkervaring in informatiebeveiliging beschikken in ten minste 3 CISM domeinen
 U moet over ten minste 5 jaar werkervaring in informatiebeveiliging beschikken in ten minste 3 CISM domeinen Bent u in het bezit van een CISA of CISSP certificering of een HBO/Bachelor in een informatiebeveiligingsgerelateerd vakgebied, dan is 3 jaar relevante werkervaring voldoende
 Bent u in het bezit van een CISA of CISSP certificering of een HBO/Bachelor in een informatiebeveiligingsgerelateerd vakgebied, dan is 3 jaar relevante werkervaring voldoende U dient de Code of Professional Ethics te onderschrijven en trouw te blijven
 U dient de Code of Professional Ethics te onderschrijven en trouw te blijven