Cybersecurity Management Principles - Contact us for further details. Kuala Lumpur, Malaysia

March 4, 2021

  home    |    360 BSI    |    new events    |    past events    |    partners    |          |    contact    |    sitemap  

360BSI Image

"For knowledge itself is power." - Francis Bacon



Document & Records Management in the Age of Big Data



Behavioral Based Safety (BBS) & Safety Leadership

Customer Service
Tel: +6016 3326 360
Fax: +603 9205 7788


Cybersecurity Management Principles

Kuala Lumpur, Malaysia

Contact us for further details.

This course covers effective strategies, techniques, systems, polices, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.

In today’s world and further into the digital future, all organizations face an ever-increasing number of information-related security challenges and risks against a backdrop of increasing national and global compliance, and audit standards and legislation.

Cybersecurity is the protection of data from theft and damage, business information, people’s identities, and how all businesses can be better equipped to work more safely in an increasingly online world where sensitive and personal information is stored, shared, and communicated.

This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. Participants will develop key skills and core competencies that will allow them to meet the ever-changing information security demands of the 21st century.

Course Participants will:

  • Understand today’s and tomorrow’s cybersecurity and cybercrime threats, issues, and risks; how to set up policies, train users, create strategies, and implement systems and tools to help protect data, information and people’s identities
  • Manage the growing volume of confidential, sensitive business information and data to protect, keep safe, and communicate securely against a backdrop of increasing cyber threats, as well as privacy, legal, and compliance regulations
  • Develop strategies and ways of working to improve detection of cybersecurity threats and improve information compliance
  • Understand the security-related international information compliance and regulations, including industry specific standards
  • Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cybersecurity


Who should attend:

  • Vice Presidents, Directors, General Managers
  • Chief Information Officers
  • Chief Security Officers
  • Chief Information Security Officers
  • Chief Technology Officers
  • Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment, IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning


Contact us for further details.



Copyright 2009, 360 BSI (M) Sdn Bhd