Tembo Sacco Plaza, Garden Estate Rd, Nairobi, Kenya
Mon - Sat: 09:00 AM - 05:00 PM

Information Security Governance & Risk Management Training Course

INTRODUCTION

This essential training course provides comprehensive knowledge and practical skills for mastering Information Security Governance & Risk Management. In today's complex and highly regulated digital landscape, effective security isn't just a technical challenge; it's a strategic imperative that requires robust governance structures and proactive risk management. Information Security Governance & Risk Management Training Course equips participants with a systematic understanding of developing security strategies, establishing clear roles and responsibilities, implementing risk assessment methodologies, and ensuring continuous compliance with legal and regulatory requirements. Participants will gain deep insights into aligning information security with business objectives, building resilient security programs, and making informed decisions to protect critical information assets and maintain organizational trust.

This course is designed for IT and security leaders, risk managers, compliance officers, auditors, and senior management who are responsible for the strategic direction and oversight of information security within their organizations. It empowers participants to move beyond technical security implementations to lead and shape an organizational culture that prioritizes security, effectively manages cyber risks, and demonstrates accountability to stakeholders, thereby enhancing overall business resilience and achieving long-term strategic goals.

DURATION

10 days

TARGET AUDIENCE

This course is specifically designed for professionals with leadership, management, or oversight responsibilities in information security, risk, and compliance, including:

  • Information Security Managers and Directors.
  • Risk Managers and Analysts.
  • Compliance Officers.
  • IT Auditors.
  • Senior IT Leaders and Business Managers.

OBJECTIVES

Upon completion of this course, participants will be able to:

  • Understand the principles of information security governance.
  • Develop and implement effective information security strategies and policies.
  • Master risk management methodologies for identifying, assessing, and treating cyber risks.
  • Ensure regulatory and legal compliance in information security.
  • Establish metrics and reporting for measuring security effectiveness.

MODULES

Module 1: Foundations of Information Security Governance

  • Define Information Security Governance and its distinction from security management.
  • Understand the key components of effective governance (e.g., leadership, strategy, accountability).
  • Discuss the role of the Board of Directors and senior management in security oversight.
  • Explore frameworks like COBIT, ISO 27001, and NIST CSF for governance.
  • Examine the importance of aligning security objectives with business objectives.

Module 2: Information Security Strategy and Policy Development

  • Understand how to develop a comprehensive information security strategy.
  • Discuss the process of creating and maintaining security policies, standards, and procedures.
  • Explore the importance of policy enforcement and communication throughout the organization.
  • Examine the hierarchy of security documentation.
  • Learn about tailoring policies to organizational culture and industry.

Module 3: Information Risk Management Principles

  • Define Information Risk Management and its continuous nature.
  • Understand the relationship between threats, vulnerabilities, and assets in risk assessment.
  • Discuss qualitative vs. quantitative risk assessment methodologies.
  • Explore risk treatment strategies (e.g., mitigate, transfer, accept, avoid).
  • Examine the importance of risk appetite and risk tolerance.

Module 4: Implementing Risk Assessment Methodologies

  • Master practical techniques for conducting information security risk assessments.
  • Discuss methodologies like OCTAVE, FAIR, or ISO 27005.
  • Explore the process of identifying and valuing information assets.
  • Examine how to identify and assess threats and vulnerabilities relevant to the organization.
  • Learn about documenting risk findings and developing risk registers.

Module 5: Risk Treatment and Control Selection

  • Understand how to select appropriate security controls to mitigate identified risks.
  • Discuss the categories of controls (e.g., technical, administrative, physical).
  • Explore the concept of control effectiveness and efficiency.
  • Examine the process of implementing security controls and managing their lifecycle.
  • Learn about continuous monitoring and re-assessment of risks and controls.

Module 6: Legal, Regulatory, and Compliance Requirements

  • Understand the impact of major data protection regulations (e.g., GDPR, CCPA).
  • Discuss industry-specific compliance requirements (e.g., HIPAA, PCI DSS).
  • Explore the role of internal and external audits in demonstrating compliance.
  • Examine the importance of contractual security requirements with third parties.
  • Learn about maintaining a legal and regulatory compliance framework.

Module 7: Security Metrics, Monitoring, and Reporting

  • Understand the importance of establishing meaningful security metrics.
  • Discuss different types of metrics (e.g., operational, tactical, strategic).
  • Explore how to monitor security performance and measure program effectiveness.
  • Examine methods for reporting security posture to stakeholders (e.g., CISO, Board).
  • Learn about communicating security risks and progress effectively.

Module 8: Third-Party Risk Management and Supply Chain Security

  • Understand the increasing importance of managing third-party security risks.
  • Discuss methodologies for vendor security assessment and due diligence.
  • Explore contractual clauses to ensure third-party compliance with security requirements.
  • Examine strategies for managing supply chain cybersecurity risks.
  • Learn about continuous monitoring of third-party security posture.

CERTIFICATION

  • Upon successful completion of this training, participants will be issued with Macskills Training and Development Institute Certificate

TRAINING VENUE

  • Training will be held at Macskills Training Centre. We also tailor make the training upon request at different locations across the world.

AIRPORT PICK UP AND ACCOMMODATION

  • Airport pick up and accommodation is arranged upon request

TERMS OF PAYMENT

  • Payment should be made to Macskills Development Institute bank account before the start of the training and receipts sent to info@macskillsdevelopment.com

 

Information Security Governance & Risk Management Training Course
Dates Fees Location Action
16/06/2025 - 27/06/2025 $2,450 Nairobi
07/07/2025 - 18/07/2025 $3,950 Kigali
14/07/2025 - 25/07/2025 $2,450 Nairobi
04/08/2025 - 15/08/2025 $5,950 Dubai
11/08/2025 - 22/08/2025 $3,950 Kigali
18/08/2025 - 29/08/2025 $2,450 Nairobi
01/09/2025 - 12/09/2025 $3,950 Kigali
08/09/2025 - 19/09/2025 $2,950 Mombasa
15/09/2025 - 26/09/2025 $2,450 Nairobi
06/10/2025 - 17/10/2025 $3,950 Kigali
13/10/2025 - 24/10/2025 $5,950 Instanbul
20/10/2025 - 31/10/2025 $2,450 Nairobi
03/11/2025 - 14/11/2025 $3,950 Kigali
10/11/2025 - 21/11/2025 $2,950 Mombasa
17/11/2025 - 28/11/2025 $2,450 Nairobi
01/12/2025 - 12/12/2025 $2,450 Nairobi