Sunteți pe pagina 1din 1

The Institute of Finance Management

C en tre for I CT R esearch and Inno vati on s (C i R I )

P.O Box 3918, Dar Es Salaam, Tel: +255 - 22- 2112931-3 Fax: 255 - 22- 2112935

Workshop on Information Security Management

Background of the Course
Information is one of the key assets of any organization. Vulnerable ICT infrastructure poses a risk to organization
information when it is processed electronically, and transmitted across the internet. Therefore, it is essential to
appropriately secure the information against the consequences of breaches of confidentiality, failures of integrity, and
interruption to availability. This workshop will introduce the fundamental and advanced concepts of Information
Security and the best practices in planning, implementing, managing and protecting organization information assets. It
will also provide IT managers and key decision makers with a comprehensive understanding of Information Security
and risk management from both technological and managerial perspectives of this rapidly growing and changing field.
As a result, organizations will gain assurance on the security and safety of their information assets.
Course Contents

Information Security

Risk Management

Access Control

Cryptograph and safe data transmission

Operation Security

Business Continuity and Disaster Recovery Plan

Understanding IT Security Policies and strategies

Learning Outcome of the Course
At the end of the workshop, participants will demonstrate understanding on:
Designing and implementing IT security measures and techniques to prevent the loss of information in the
Risk management practices and tools to identify, rate, and reduce the risk to specific information assets.
Managing and controlling using available access control security tools and technologies for protection of the
organization information assets from threats and vulnerabilities.
Gaining oversight of various processes and techniques that can be implemented to ensure that an
organization information system can maintain the desired availability when faced with threats that impact
Developing, implementing, maintaining, and testing an appropriate continuity planning process for assisting in
the survival of the organization information assets following a disaster.
Developing and using IT security policy to protect organization business process.
Target Group
This training is useful to IT Managers, Network Administrators, System Administrators, IT Security Officers, and ICT
Engineers. Business Managers, Internal and External Auditors, and other non IT practitioners are also invited to attend.
The training fee is TZS 1,350,000/=, which will cover training materials, refreshments, lunch and certificate of
participation. You can pay at any CRDB Branch in Tanzania, Account Number: 01J1042984102, Account Name: The
Institute of Finance Management.
Venue & Dates
Morogoro at Edema Hotel from 15/06/2015 to 18/06/2015 Time 09:00AM 05:00PM
Zanzibar at Oceanic Paradise Resort from 22/06/2015 to 25/06/2015 Time 09:00AM 05:00PM
Mwanza at Monarch Hotel from 29/06/2015 to 02/07/2015 Time 09:00AM 05:00PM
Arusha at Corridor Springs Hotel from 13/07/2015 to 16/07/2015 Time 09:00AM 05:00PM
IFM Block A, Room No. G20 or through Email address:,
For more information contact Tel: +255 222112931-4 or Mobile: +255784998831