Participants across North America have enthusiastically received risk Masters' professional training courses. Most participants are Information Security professionals, Business Continuity Management and IT Disaster Recovery specialists, IT Auditors, and Risk Managers.
All Risk Masters seminar workshops are available for remote presentation over the Internet and for in-person training.
Why are these courses so successful? What differentiates Risk Masters' professional training classes?
Presents the strengths and impediments of implementing Zero Trust Architecture and what needs to be done to achieve the objectives of this architecture.
Provides auditors, risk managers and security professionals with an understanding of what AI is (and what it is not), its risks, the methods for auditing and managing those risks and achieving enterprise value from AI
Involves participants in both the tactical and strategic decision-making and design processes that lead to never-fail enterprises.
Introduces attendees to the principles, practices, legislation, and governance of Personal Information Privacy.
Presents individuals responsible for dealing with cyberattacks to the principles and practice of prevention, detection, and recovery from hostile actions against computer systems.
Introduces I.T. Auditors, Risk Managers and Information Security Professionals to the principles and practice of Business Continuity Management (BCM)
Introduces participants to the systems architecture concepts and practices that are being used to use to design, build and audit security, resilience, and controls as the traditional data center disappears.
Provides auditors and managers with an understanding of what AI is (and what it is not), its risks, the methods for auditing and managing those risks
Presents the strengths and impediments of implementing Zero Trust and what needs to be done to achieve the objectives of this architecture
Presents the methods for assessing and managing the risks of AI projects, from inception through design, development, deployment and into ongoing operational use
Presents the many elements of information security that are implied in ZTA but are not explicitly stated. These constitute the Zero Trust Environment, which must be in place for the architecture to be implemented.
Introduces I.T. Auditors, Risk Managers and Information Security Professionals to methods for ensuring that Business Continuity Management (BCM) and Resilience programs meet their objectives
Presents a practical approach to developing and implementing cyber resilience: managing the risk through insurance and building a program that includes executive management, business leadership and technology.
Learn techniques that are being used by advanced risk practitioners and that are the most applicable to contemporary enterprises.
Focuses on the role auditors can play in assuring that their organizations are taking appropriate measures to protect themselves from cyberattacks.
Presents practical measures to move the attitudes of senior and middle management, along with working staff, towards an effective Information Security Culture.
Presents practical and innovative approaches to achieving the goals of privacy practitioners, security professionals and IT auditors.
Risk Masters' training fees are intended for both professional societies and companies seeking in-house training. Contact Risk Masters to learn our current training fees.