IT Security for Project Managers
Project managers are called to be experts in their respective fields and they do so by staying current and knowledgeable. This is an imperative practice and has a direct impact on project success. One topic many project managers are intimidated by is Information Security. Information Security concerns should always be a priority when planning and managing project risks. Although Project Managers don’t need to be the IT expert in the organization, they must know the right questions to ask.
How You Will Benefit
- Gain foundational knowledge of the DoD IT Security Framework
- Learn how to measure the risk maturity levels of an organization
- Understand how to complete an information risk assessment
- Improve your knowledge of how to handle sensitive data and what qualifies as protected information
- Apply lessons learned from traditional project management to implement IT Security risk strategies
What You Will Learn
In this course you will learn the foundational concepts of IT Security including:
- Data Security and Compliance…What’s the Difference?
- Risk Management and the Cyber Security Framework
- Basic Risk Management Methodology
- How to Complete an Information Risk Assessment
- Common Risk Denominators and Factors
Who Should Attend
This course is designed for project managers hoping to get a better understanding of how to plan, monitor and control IT Security related risks.
Format
Video-On-Demand: Includes 6-months digital access to all training materials.
Duration / PDU Value
This course has been approved by PMI for 2 PDUs.
Outline
Introduction
- Course Overview
- Data Security and Compliance… What’s the Difference?
Frameworks
- The Five Functions of the Cyber Security Framework
- Identify
- Protect
- Detect
- Respond
- Recover
Risk Management
- Risk Management and the Cyber Security Framework
- Measuring Organizational Risk Management Maturity Levels
- Basic Risk Management Methodology
- Information Risk Assessment
- Third Part Risk Management
Common Denominators and Risk Factors
- Cyber Security Defined
- Privacy Defined
- Advanced Data Security Techniques
- Common Risk Factors
- Sensitive Data Types (HIPPA, PHI and PCI)
Best Practices
- Best Practices for all Organizations
- Data Recovery Types
- Lessons Learned from Project Management
- Features of a Generic Project Life Cycle
- Tailoring the Process
- Project Phases