|Risk-Based Approach to IT Infrastructure Security & Control Assessments|
Key information security governance controls, including a risk-based approach to design, operation and assessment of security and controls are critical to ensuring that an organization’s information assets are adequately protected to prevent compromise.
This session will discuss a risk-based approach to assessment of security and control in the following areas:
1. IT Infrastructure Risk & Control
2. Security Standards and Baselines
3. Security Compliance Process and Control Assessment
2. Operating System Security
- E.g. Windows Server, Linux
3. Database Security
- E.g. Oracle, SQL Server
4. Network Security
- Network Perimeter, Firewalls
John Tannahill, CA, CISM, CGEIT, CRISC, CSXP
John is a management consultant specializing in information security and audit services.
His current focus is on security and control in large information systems environments and networks. Specific areas of technical expertise include Windows and Linux operating system security, network security, database security and cybersecurity.
John is a frequent speaker in Canada, USA, Europe, Africa and Asia on the subject of Information Security. He is a member of the Institute of Chartered Accountants of Scotland.
Registration is now closed.