00:04
Hi. This is Kelly Hander Han and I will welcome you to Cyber Aires course on becoming a chief information security officer and the reason we'd like to offer this course we have several different purposes. First of all, we know that there may be many of you that are considering going into the field of management in relation information, security,
00:23
and there's a wide realm of knowledge and expectations you would have to enter that position.
00:28
So we want to give you kind of annoyed idea of their skills that you would need to have them to basic instruction on them. We also want to tackle this course for those of you that are currently working in the information Security Management field, and we want to make sure that we fill in any gaps in your knowledge. For instance, maybe you don't have that much experience running policy.
00:47
Or maybe you're not as familiar with the technologies you would like to be. This course is for you
00:53
and then third. We also wanted to provide a course for those of you that would have an interest in this field, but also that would provide you with continuing education units for some of those certification classes that you may already have taken and certifications you may have,
01:07
whether it's security clause or C i s s pieces, um, any of those others this course will consider or will satisfy
01:15
the CTU requirements.
01:18
All right, so in this particular trip class our agenda, we've got eight modules that we're going to cover, and the very first module is gonna be an introductory module. It's gonna be why we even need a sizzle. What problems are we trying to solve? And then we'll move right into information, security, governance, and talk about
01:37
the importance of governance in our environment in relation to the world of security.
01:42
We'll go with module three and move into risk management
01:46
module for after we've completed risk management. And we know the threats and vulnerabilities that we're addressing. We're gonna move right into developing our strategy, and our strategy is gonna be very broad in sight. And we're gonna look to accomplish our strategy through policies and procedures, guidelines, standards.
02:05
Um, well, also cover the technology that as an information security officer, I would expect you to know it's a pretty high level introduction to technology. I don't need to get into the weeds into the really deep
02:19
details because an ISO doesn't necessarily have to be a technology expert. They do have to have a good foundational knowledge. Ah, Chapter seven, What do we do when these incidents do occur? How are we going to respond and manage so that we can minimize disruptions to the business and then chapter eight?
02:37
Ah, business continuity. You know, I tend to think of every decision we make, starting with risk management and all marching towards
02:45
business continuity, keeping the business going no matter what. And ultimately, when you think about it as an information security officer, that's my job, right? Minimize disruptions on the business, whether large or small.
02:59
So this is the course. That's the information that we're gonna cover. And I hope you enjoy our course on Chief Information Security Office