Cybersecurity Management in the Age of Big Data - Contact us for more info Kuala Lumpur, Malaysia

April 20, 2021

  home    |    360 BSI    |    new events    |    past events    |    partners    |          |    contact    |    sitemap  

360BSI Image

"Leadership is practiced not so much in words as in attitude and in actions." - Harold Geneen



Document & Records Management in the Age of Big Data



Behavioral Based Safety (BBS) & Safety Leadership

Customer Service
Tel: +6016 3326 360
Fax: +603 9205 7788


Cybersecurity Management in the Age of Big Data

Kuala Lumpur, Malaysia

Contact us for more info

This course covers effective strategies, techniques, systems, polices, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.

In today’s world and further into the digital future, all organizations face an ever-increasing number of information-related security challenges and risks against a backdrop of increasing national and global compliance, and audit standards and legislation.

Cybersecurity is the protection of data from theft and damage, business information, people’s identities, and how all businesses can be better equipped to work more safely in an increasingly online world where sensitive and personal information is stored, shared, and communicated.

This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. Participants will develop key skills and core competencies that will allow them to meet the ever-changing information security demands of the 21st century.

Course Participants will:

  • Understand today’s and tomorrow’s cybersecurity and cybercrime threats, issues, and risks; how to set up policies, train users, create strategies, and implement systems and tools to help protect data, information and people’s identities
  • Manage the growing volume of confidential, sensitive business information and data to protect, keep safe, and communicate securely against a backdrop of increasing cyber threats, as well as privacy, legal, and compliance regulations
  • Develop strategies and ways of working to improve detection of cybersecurity threats and improve information compliance
  • Understand the security-related international information compliance and regulations, including industry specific standards
  • Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cybersecurity


Who should attend:

  • Vice Presidents, Directors, General Managers
  • Chief Information Officers
  • Chief Security Officers
  • Chief Information Security Officers
  • Chief Technology Officers
  • Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment, IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning


Contact us for further details.



Copyright 2009, 360 BSI (M) Sdn Bhd