IT, Telecommunication , Networking Training Courses

Enterprise Data Security & Risk Management

Duration
2025-12-01 5 Days 2025-12-05
Attendance

Hotel Meeting Room

Hotel Meeting Room
Course code
IT-664
Copied !
City / venue
Beijing

Classroom

Fees / hours
4950 $ | 25 Hours

Course registration form

Candidate Data

Candidate full name *
Email *
Private phone number *

Work phone number

Optional

Country & City *
Company / Employer *

Invoice Recipient Data

Recipient name *
Recipient phone number *
work phone number *

Recipient email

Optional

Recipient work address details

Optional



Sending course brochure to my e-mail

Please leave us your contacts, and we will call you back as soon as possible

Full name *
Email *

Private phone number

Optional



Call me back

Please leave us your contacts, and we will call you back as soon as possible

Full name *
Private phone number *
Company / Employer *


Course Inquiry

Please provide us with your contacts with your inquiry, and we will answer it as soon as possible

Full name *
Email *
Private phone number *
work phone number *
Country & City *
Company / Employer *

Your Inquiry



In-house proposal

Please provide us with your contacts and the details of the needed in-house proposal, and we will contact you as soon as possible

Full name *
Email *
Private phone number *
work phone number *
Country & City *
Company / Employer *

Your Inquiry



Course details

Overview ?

The Course

Data security for today's organisations is an ever increasing difficult task, especially with the increasing sophistication and volume of attacks aimed at stealing information. Protecting data becomes an perpetual challenge, with the view of an increased usage of mobile devices, such as laptops and smart phones. Furthermore, disaffected internal employees often have access to sensitive information. As companies expand and acquire more data, the need for a well managed solution that integrates multiple data-protection technologies to provide comprehensive enterprise coverage, along with persistent data protection, becomes a necessity across the enterprise. This can only be achieved with a credible appreciation of risk.

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. An appropriate risk management framework can bring visibility to key business and compliance risks and enable an organisation to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved in focusing on relevant areas of IT risk of data security within the enterprise environment.

Using international standards, an effective risk management control framework and current best practice, the aim of this seminar will advise senior executives and management on how to implement secure safeguards within a virtually borderless environment.

The Goals
During the five day seminar delegates will:
  • How to take control of Risk Management Programme and learn appropriate methods.
  • How to identify and address risk and compliance issues as presented within a global economy.
  • How to design and leverage Risk Management Programme to reduce cost and risk through effective prioritisation and processes.
  • Appreciate legal, technical and management risk within the Enterprise Environment and how to quantify these effectively.
  • Appreciate the external risk of cyber crime.
  • How to measure the financial value of Data Security and Risk Management and communicate these to line executives effectively.
  • How governance and risk management trends are affecting corporate enterprises.
  • International Standards for Data Security and Risk Management and best practice for managing compliance for security, crisis management, disaster recovery and high resilience and availability.
The Delegates

This seminar has been designed for individuals involved in, Risk Assessment, Information Security and Management of IT Systems and Enterprise Data Security. It is particular benefit to Application Service Providers, Network Architecture Personnel, individuals in regards to IT Risk, Policy and Compliance in addition to Security Service Vendors and specialist investigators and those with a responsibility for managing and securing information assets.

It is expected that delegates have a reasonable technical understanding of technology, electronic risk and security considerations, both technical and management.

The Process

Participants will gain detailed knowledge by active participation in seminars, group discussions and real life case studies. Delivery will be by presentation, group syndicate investigations, training DVD and interactive seminars.

The Benefits
By the end of this seminar participants will:
  • The seminar will provide delegates with an understanding of the range of cyber attacks and other relevant risk that are exploited today, and their likely evolution within an enterprise environment.
  • Using real life case studies, international standards and best practice, delegates will become aware of how to identify, quantify, and mitigate technical and IT risks effectively, using a range of methods of digital and management prevention strategies and techniques.
  • The seminar will also provide delegates with an overview of key regulations, statutory provisions and the commercial challenges which this brings.
The Results
  • Organisations will be better educated in relation to formulation of risk management frameworks, technology, legal and enterprise data security risks and associated obligations in regards to identification of a cyber attack, security breaches and appropriate defences that can be considered as a preventative solution.
  • Appreciation and implementation of Information Security Management Framework, can seek to ensure adequate safeguards are implemented to mitigate identified risks and that resources are apportioned effectively.
  • Place good reliance on controls which safeguard and utilise data for relevant business processes, and offer a secure framework for expanding and controlling the enterprise data security effectively.
  • Being able to adapt current best practice will ensure that corporations can understand and mitigate legal risks and challenges which are encountered, both nationally and internationally whilst benefitting from leading and effective solutions.
The Course Content
Day One
Development of Enterprise Architecture
  • Introduction, Development and Role in Modern Enterprise
  • Strategic, Tactical and Operational Considerations
  • Key Considerations in Development of Enterprise Architecture
  • Enterprise Architecture Project Management Considerations
Objectives of Security and IT Security Management

 

Day Two
Risk Assessment and IT Risk Management
  • Categorising and Managing Risk
  • Risk Analysis and Threat Identification Methodologies
  • Vulnerability Analysis
  • Understanding the need for effective Risk Management
  • Legal and Regulatory Considerations
  • Key Strategic and Security Considerations
The Need and Benefits for Information Security
  • Electronic and physical risk
  • Utilising Information Security to protect business assets
  • Information and Data Risk Management
  • Data and asset classification

 

Day Three
Data Security
  • Ensuring Information Security in an Enterprise Wide Environment
  • Vulnerability Assessments
  • Management and Technical Control Measures with Systems and Network Design
Legal and Regulatory Considerations
  • Data Protection
  • Intellectual Property
  • Contracts and Commercial Liability
Data Sharing and Best Practice
  • Defining data classification and business ownership
  • Establishing Memorandum of Understanding/Transfer Agreements
  • Best Practice Guidance for data sharing
  • Avoiding common errors and liability
Overview of International Standards and Best Practice

 

Day Four
Introduction to computer system design and enterprise design security
  • Types of electronic and management controls for electronic information
    • Network, Operating System and Application controls and password schemes
    • Ensuring Confidentiality, Integrity, Availability, Authenticity and Accountability
  • Overview of ISO27002 Code of Practice for Information Security Management and Relevant Controls

 

Day Five
Provisions and challenges
  • ISO 3100 Risk Management Principles and Guidelines
  • Challenges within Enterprise Architecture and IS environments
  • Common Oversights with Enterprise Architecture and IS Environments
  • Risk Management and Compliance
  • Success Factors for Effective Enterprise Data Security Management

Day 1

Asset Cost Management Introduction

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 2

Laying the Groundwork

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 3

Applying the Value based Process

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 4

Ensuring the Continuity of the Value-based Process

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 5

Supporting Process that Lower Life-cycle costs

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Training Methodology

Pathways Training and consulting adopts the newest techniques of human resources Training and consulting and, with the following:

  • Theoretical lectures are delivered via PowerPoint and visual displays (videos and short films)
  • Making scientific evaluation to the trainee (before and after)
  • Brainstorming and role-playing
  • Using case studies related to the scientific material being delivered and the trainees' work.
  • The participants get the scientific and practical material printed and on CDs and Flash memories.
  • Preparing records and reports of the participants' attendance and results, with a general evaluation of the training program.
  • A group of the best trainers and experts in all fields and specialties professionally prepares the scientific material.
  • After finishing the course, the participants get certificates of attendance signed, certified, and issued by pathways Training and consulting.
  • Our training programs start at 9:00 o'clock in the morning and end at 2:00 in the afternoon, with snack buffet during the lectures.
  • Providing a lunch buffet during the training program period, with organizing a lunch party on the training program final day for taking some photos and certificate awarding.
Different venues & timings for this course

Course name

Duration

City

Price

Enterprise Data Security & Risk Management

17, Feb 2025 21, Feb 2025

Vienna

4750$

Enterprise Data Security & Risk Management

24, Feb 2025 28, Feb 2025

Munich

4750$

Enterprise Data Security & Risk Management

03, Mar 2025 07, Mar 2025

Prague

4750$

Enterprise Data Security & Risk Management

10, Mar 2025 14, Mar 2025

Rome

4750$

Enterprise Data Security & Risk Management

17, Mar 2025 21, Mar 2025

Jakarta

3500$

Enterprise Data Security & Risk Management

23, Mar 2025 27, Mar 2025

Tunisia

3250$

Enterprise Data Security & Risk Management

24, Mar 2025 28, Mar 2025

Milan

4750$

Enterprise Data Security & Risk Management

31, Mar 2025 04, Apr 2025

Marbella

4750$

Enterprise Data Security & Risk Management

07, Apr 2025 11, Apr 2025

Paris

4750$

Enterprise Data Security & Risk Management

14, Apr 2025 18, Apr 2025

Madrid

4750$

Enterprise Data Security & Risk Management

20, Apr 2025 24, Apr 2025

DUBAI

2950$

Enterprise Data Security & Risk Management

28, Apr 2025 02, May 2025

Kuala Lumpur

3250$

Enterprise Data Security & Risk Management

04, May 2025 08, May 2025

Amman

2750$

Enterprise Data Security & Risk Management

11, May 2025 15, May 2025

Marrakesh

2950$

Enterprise Data Security & Risk Management

18, May 2025 22, May 2025

Sharm ElShaikh

2750$

Enterprise Data Security & Risk Management

25, May 2025 29, May 2025

Doha

3500$

Enterprise Data Security & Risk Management

01, Jun 2025 05, Jun 2025

Casablanca

2950$

Enterprise Data Security & Risk Management

08, Jun 2025 12, Jun 2025

Riyadh

2750$

Enterprise Data Security & Risk Management

16, Jun 2025 20, Jun 2025

Istanbul

2950$

Enterprise Data Security & Risk Management

22, Jun 2025 26, Jun 2025

Jeddah

2750$

Enterprise Data Security & Risk Management

23, Jun 2025 27, Jun 2025

Milan

4750$

Enterprise Data Security & Risk Management

29, Jun 2025 03, Jul 2025

Manama

2750$

Enterprise Data Security & Risk Management

06, Jul 2025 10, Jul 2025

Beirut

2750$

Enterprise Data Security & Risk Management

14, Jul 2025 18, Jul 2025

Singapore

4950$

Enterprise Data Security & Risk Management

20, Jul 2025 24, Jul 2025

Kuwait

2750$

Enterprise Data Security & Risk Management

27, Jul 2025 31, Jul 2025

DUBAI

2950$

Enterprise Data Security & Risk Management

04, Aug 2025 08, Aug 2025

Kuala Lumpur

3250$

Enterprise Data Security & Risk Management

10, Aug 2025 14, Aug 2025

Amman

2750$

Enterprise Data Security & Risk Management

17, Aug 2025 21, Aug 2025

Marrakesh

2950$

Enterprise Data Security & Risk Management

24, Aug 2025 28, Aug 2025

Sharm ElShaikh

2750$

Enterprise Data Security & Risk Management

31, Aug 2025 04, Sep 2025

Doha

3500$

Enterprise Data Security & Risk Management

07, Sep 2025 11, Sep 2025

Casablanca

2950$

Enterprise Data Security & Risk Management

14, Sep 2025 18, Sep 2025

Riyadh

2750$

Enterprise Data Security & Risk Management

22, Sep 2025 26, Sep 2025

Istanbul

2950$

Enterprise Data Security & Risk Management

28, Sep 2025 02, Oct 2025

Jeddah

2750$

Enterprise Data Security & Risk Management

05, Oct 2025 09, Oct 2025

Manama

2750$

Enterprise Data Security & Risk Management

12, Oct 2025 16, Oct 2025

Beirut

2750$

Enterprise Data Security & Risk Management

20, Oct 2025 24, Oct 2025

Singapore

4950$

Enterprise Data Security & Risk Management

26, Oct 2025 30, Oct 2025

Kuwait

2750$

Enterprise Data Security & Risk Management

03, Nov 2025 07, Nov 2025

Berlin

4750$

Enterprise Data Security & Risk Management

10, Nov 2025 14, Nov 2025

Brussels

4750$

Enterprise Data Security & Risk Management

16, Nov 2025 20, Nov 2025

Khobar

2750$

Enterprise Data Security & Risk Management

17, Nov 2025 21, Nov 2025

Zurich

4750$

Enterprise Data Security & Risk Management

24, Nov 2025 28, Nov 2025

Trabzon

3500$

Enterprise Data Security & Risk Management

01, Dec 2025 05, Dec 2025

Beijing

4950$

Enterprise Data Security & Risk Management

08, Dec 2025 12, Dec 2025

Amsterdam

4750$

Enterprise Data Security & Risk Management

15, Dec 2025 19, Dec 2025

Bangkok

4950$

Enterprise Data Security & Risk Management

21, Dec 2025 25, Dec 2025

Muscat

2750$

Enterprise Data Security & Risk Management

29, Dec 2025 02, Jan 2026

Bangkok

4950$

Have a look too on these courses