AICPA logo
Cart
searchSearch
search
burger
AICPA logo
  • Home
product-image
Information Security Governance
CPE Self-study

Information Security Governance

Provides participants with the knowledge and tools needed to maintain an effective framework for information security governance.

$148 - $235
Do you have an AICPA membership? Log in to apply your member discount.

Format

Online

NASBA Field of Study

Information Technology

Level

Basic

CPE Credits

11.5

Author(s)

Gwen Bettwy, Mike Beevers, Mark Williams

Availability

1 year

Learning Outcomes
  • Recognize and differentiate information security policies and strategies to guide the development of standards and procedures, in alignment with organizational goals and objectives.
  • Identify and analyze risk management processes and procedures to ensure compliance with applicable security, privacy laws and regulations.
  • Identify and differentiate among the four types of access control: identification, authentication, authorization, and accountability.
  • Identify logical and physical access controls necessary to safeguard critical systems and information pursuant to compliance requirements.
  • Identify incident response processes for detecting and responding to security risks.
  • Determine the proper steps to implement comprehensive business continuity, disaster recovery, and incident response plans.
Key Topics
  • Elements of security policy
  • Organizational risk assessment
  • Identity and access management
  • Logical and physical access controls
  • Network and system security controls
  • Buiness continuity planning
  • Disaster recovery
Product Details

The essential competencies you need to understand information security strategies.

Information security governance is an essential part of any organization or firm's cybersecurity strategy. This CPE course will provide participants with the knowledge and tools needed to maintain an effective framework for information security governance. You will also recognize the policies, controls and countermeasure procedures to ensure proper control and compliance over confidentiality, availability and information.

Please note: If you are seeking the CITP credential this course provides essential competencies on the learning pathway towards understanding information security strategies to help guide and maintain access control polices and procedures in alignment with organizational objectives and compliance requirements.

Pricing
Do you have an AICPA membership? Log in to apply your member discount.
Nonmembers
Online
$235.00
AICPA Members
Online
$185.00
CITP Credential Holders
Online
$148.00

Looking for group pricing?

We can help with group discounts. Call us at 1-800-634-6780 (option 1) or email us at salessupport@aicpa.org

Contact us
Credit Info
CPE Credits
Online
11.5
NASBA Field of Study
Information Technology
Level
Basic
Prerequisites
None
Access
Online
This is a digital product. You will have access to the content for 1 year after purchase date.
Instructors
Gwen Bettwy
Ms. Gwen Bettwy, CISSP, SSCP, provides content development and knowledge product development services for the creation of Instructor Led Training (ILT), online, e-Learning training, and self-study knowledge products for IT security curricula and courseware. She incorporates instructional design methodology in the creation of knowledge transfer solutions for professional training and certification programs. Ms. Bettwy's career and technical background over 15 years of technical engineering, technical management, and P&L management in the IT field. This experience includes wide area networking technologies such as Frame Relay/X.25, ATM, IP broadband networks, LAN/WAN internetworking, enterprise network management, and IT security. Prior to joining TSI, Ms. Bettwy was a Cisco Certified Systems Instructor (CCSI) teaching Cisco Internetworking and Security training courses throughout the world. Ms. Bettwy's IT consulting experience includes a wide variety of IT technologies and systems/applications. Her expertise is in the design, creation, and program management of large-scale development projects for ILT, online, e-Learning, or self-study knowledge products. Currently, Ms. Bettwy is an (ISC)2 Certified Instructor and teaches the CISSP and SSCP CBK Review Seminars.
Mike Beevers
Mr. Mike Beevers, CISSP presides over training, custom course development and content delivery of enterprise security courses. Mr. Beevers is a Certified Cisco Systems Instructor ( CCSI) and Authorized (ISC) 2 instructor. Since 1997, Mr. Beevers has been an Information Systems Security consultant and professional instructor teaching various Information Technology training courses specializing in IT security, advanced TCP/IP, LAN/WAN, Internetworking, and Patch Management. As a lead consultant, Mr. Beevers creates, evaluates and implements enterprise security policy, practices and procedures as well as conducting enterprise security and vulnerability assessments. Mr. Beevers has assisted developing enterprise security frameworks which enable companies to comply with current regulations and legislation. In 2006, Mr. Beevers worked with the State of Maryland performing a vulnerability assessment as well as testing and verifying the security functions of Maryland's Online Voter Registration System. Prior to becoming an enterprise trainer along with Gwen and Mike, Mr. Beevers owned and operated a consulting business that provided IT consulting and training services. During the 10 years that Mr. Beevers operated this practice, he also consulted with Security Evolutions Inc. where he helped design and implement the security architecture, IT infrastructure upgrade and Business Continuity/Disaster Recovery Plan for the University of the Virgin Islands. Mr. Beevers has over 20 years of IT and technology experience in telecommunications, LAN/WAN internetworking technologies, and IT Security. Mr. Beevers began his career in technology in the United States Navy as an Electronics Technician and later as an Electronics Warfare Operator specializing in electronic intelligence gathering. After his 9 years of military experience, Mr. Beevers worked for the DoD at the Air Combat Environment Test and Evaluation Facility (ACETEF) in Patuxent River Maryland. Following this work experience Mr. Beevers started his consulting firm, Computer Bytes of SMD. Inc. in 1997. Mr. Beevers has obtained the following professional certifications during his technical career: MCSE, CISSP, CCNA, CCSI, TICSA."
Mark Williams
Mr. Mark Williams, CISSP and (ISC)2 Certified Instructor, is a Vice President working in our Consulting Business Unit responsible for designing, supporting, and advising clients on IT security strategies. For the past 18 years, Mr. Williams has been in the field of technical engineering, IT technologies, and IT security. Mr. Williams has been a professional instructor for the past seven years teaching various IT technical training courses specializing in advanced TCP/IP, LAN/WAN, Internetworking, and IT security technologies. Mr. William's professional teaching experience was obtained from contracted teaching assignments with the leading IT and IT security training companies in the world namely Global Knowledge, EnteraSys, Netarch, Foundstone, (ISC)2 and (ISC)2 Institute. Currently, Mr. Williams is an (ISC)2 Certified Instructor and teaches the CISSP and SSCP CBK Review Seminars for (ISC)2 Institute. In addition, Mr. Williams provides consulting services for our IT Security Consulting business unit conducting vulnerability assessments, penetration tests, and IP-VPN designs and configurations. Mr. Williams's career and technical background covers 18 years of technical engineering and management in the IT field. This experience includes wide area networking technologies such as Frame Relay, ATM, IP broadband networks, LAN/WAN internetworking, enterprise network management, and IT security. During this career, Mr. Williams has held various certifications including Enterasys Systems Engineer (ESE), Enterasys Systems Certified Trainer (ESCT), Brocade Certified Fabric Professional (BCFP) and Cisco Certified Network Associate (CCNA). Prior to establishing his own company as an independent IT security instructor and consultant, Mr. Williams worked as a defense contractor at the Air Combat Environment Test and Evaluation Facility (ACETEF) in Patuxent River, MD where he served as the Network Operations Manager and Information Systems Security Officer (ISSO). In this role, Mr. Williams was responsible for the design, implementation, configuration, security and day to day support for LAN/WAN network infrastructures ranging from unclassified to Top Secret level. From 1986 to 1995, Mr. Williams proudly served as an Aviation Electronics Technician in the United States Navy. During his service, Mr. Williams supported numerous campaigns. The most notable of which include Operation Desert Shield, Operation Desert Storm and Operation Provide Comfort.
Accessibility

The Association is dedicated to removing barriers to the accountancy profession and ensuring that all accountancy professionals and other members of the public with an interest in the profession or joining the profession, including those with disabilities, have access to the profession and the Association's website, educational materials, products, and services.The Association is committed to making professional learning accessible to all product users. This commitment is maintained in accordance with applicable law. For additional information, please refer to the Association's Website Accessibility Policy. As part of this commitment, this product is closed-captioned. For additional accommodation requests please contact adaaccessibility@aicpa-cima.com and indicate the product that you are interested in (title, etc.) and the requested accommodation(s): Audio/Visual/Other. A member of our team will be in contact with you promptly to make sure we meet your needs appropriately.

Information Security Governance
Select from the following options:
Online
$235.00
Nonmember Price
$235.00
Price excluding sales tax
$235.00
Do you have an AICPA membership? 
Log in to apply your member discount.
Shipping cost and sales tax will be added later during checkout

Related content