Information Security Management

RegisterInquiry
Information Security Management
Loading...

B1578

Sharm El-Sheikh (Egypt)

15 Nov 2026 -19 Nov 2026

4900

Overview

Introduction:

Information security management refers to structured frameworks that govern the protection of information assets, ensuring confidentiality, integrity, and availability across institutional environments. It encompasses the development of policies, control systems, risk management structures, and regulatory compliance models that secure organizational operations against internal vulnerabilities and external threats. This training program presents systems for structuring security governance, risk management approaches, control frameworks, and regulatory compliance structures to strengthen institutional resilience and maintain operational continuity.

Program Objectives:

By the end of this program, participants will be able to:

  • Explore frameworks defining information security management structures.

  • Develop policies and governance models supporting security objectives.

  • Gain the skills to organize systems for identifying and assessing security risks.

  • Structure frameworks for compliance with regulatory and security standards.

  • Support the resilience and continuity of security programs.

Targeted Audience:

  • Information Security Managers and Officers.

  • Risk Management Professionals.

  • Compliance and Governance Specialists.

  • IT Managers overseeing cybersecurity functions.

  • Internal Auditors and Regulatory Affairs Teams.

Program Outline:

Unit 1:

Fundamentals of Information Security Management:

  • Frameworks defining information security objectives and scope.

  • Models organizing roles and responsibilities in security governance.

  • Systems structuring classification and protection of information assets.

  • Avenues for linking security management with organizational risk strategies.

  • Institutional frameworks supporting information security.

Unit 2:

Risk Assessment and Threat Management:

  • Models for identifying threats and vulnerabilities.

  • Systems organizing structured risk assessments and analyses.

  • Structures defining criticality and impact of identified risks.

  • Frameworks supporting prioritization of risk responses.

  • Approaches for integrating risk assessment with decision-making structures.

Unit 3:

Security Policies, Standards, and Procedures:

  • Models structuring policy development and enforcement mechanisms.

  • Standards linking organizational operations to information security controls.

  • Documentation and recordkeeping frameworks.

  • Structures promoting consistent application of security requirements.

  • Frameworks supporting internal compliance and audit readiness.

Unit 4:

Security Controls and Incident Management:

  • Systems defining preventive, detective, and corrective security controls.

  • Models structuring access control, encryption, and network protection measures.

  • Frameworks organizing security monitoring and anomaly detection systems.

  • Structures managing incident response planning and escalation processes.

Unit 5:

Compliance and Continuous Improvement:

  • Frameworks organizing compliance with ISO 27001, NIST, and related standards

  • Structures reinforcing ongoing audit and compliance readiness.

  • Strategies promoting continuous improvement of information security programs.

  • Models linking security governance to institutional performance and reporting.