INFORMATION SECURITY TRACK
From zero to CISO
Information Security is where it all started for SECO. It’s our flagship curriculum that laid the foundation for where we are today. With trainings ranging from zero to CISO and from understanding, applying, managing and leading information security, we offer the most complete package suitable for both running your security awareness project as well as building the next generation of security leaders.
Lies Alderlieste-de Wit
Author & Trainer
Global Director cybersecurity governance at Danone
Author & Trainer
Security Transition Manager,
Agile & Security Leadership
Cyber Security leader
at PwC Luxembourg
Senior Risk Manager,
Information Security Courses
Information Security Foundation
Anyone looking for a fundamental understanding of information security and information security management. Entry level information security professionals.
Understand and apply information security.
Comprehensive introduction to information security and information security management.
Introduction to ISO27001 and ISO27002.
Learn how to chart potential information security threats. Explore physical, technical and organizational control measures to protect information.
Basics of Risk Management and Risk Analysis.
How a security organization is designed and operated.
Legal and regulatory requirements relevant to information security.
Information Security Practitioner
Those looking to build a career in information security and work as information security officer, security manager.
Manage information security.
Integrate information security into strategic management and organisational culture. Ensure compliance with laws, regulations and standards.
Adopt a risk-based approach to information security. Balance interests and threats. Apply resilience management principles. Contribute to effective information security governance. Plan and perform information security risk assessments Develop an implementation plan for the ISO/IEC 27001 standard.
Apply best practice project management principles. Compose and lead a project team.
Evaluate types of information security risks posed by human behaviour. Develop an effective information security awareness action plan based on behavioural, learning and adoption theories.
Evaluate and Coordinate activities in Identity and Access Management and Incident Response.
Review a Security audit report and create an actionable improvement plan.
Experienced information security professionals looking to lead security in a CISO- or similar role. Information security managers, information security officers, senior security consultants.
Lead information security.
IT / business / security alignment. Shift from technology and risk based to business- aligned. Ways security can be structured in an organization and the impact on the CISO mandate and role.
Govern, align and lead cyber security into an organization. Create strong allies with compliance and assurance to have everything in line with regulatory and legal requirements.
Position the CISO as a trusted strategic advisor. Build a strong information security team and organisation with appropriate funding and executive support.
Establish a good relationship with internal and external stakeholders. Lead cyber security vs being lead. Communication ways, reverse psychology vs direct communication. Create a compelling story instead of denying projects because of security concerns.
Translate strategic information security goals to an information security plan with realistic targets and goals. Define resource planning and budgets. Create a business case.
Manage information security in operations, programs, projects, supply chains, geographical locations, business units. Report to the board and external stakeholders.