BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Smart Training Center - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Smart Training Center
X-ORIGINAL-URL:https://smart-training-center.com
X-WR-CALDESC:Events for Smart Training Center
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Asia/Krasnoyarsk
BEGIN:STANDARD
TZOFFSETFROM:+0700
TZOFFSETTO:+0700
TZNAME:+07
DTSTART:20250101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Asia/Krasnoyarsk:20260609T083000
DTEND;TZID=Asia/Krasnoyarsk:20260610T160000
DTSTAMP:20260422T045454
CREATED:20241122T041540Z
LAST-MODIFIED:20260227T091131Z
UID:822-1780993800-1781107200@smart-training-center.com
SUMMARY:IT Risk Management
DESCRIPTION:BACKGROUND & ABOUT THE COURSE:\nIT Risk Management (IT-RM) courses focus on achieving the perfect balance between leveraging IT opportunities for growth and minimizing potential risks or losses. As an essential component of good management practices\, it’s plays a critical role in fostering effective corporate governance. By following an iterative process\, consisting of structured steps taken in sequence\, organizations can ensure continuous improvement in IT decision-making. This approach not only enhances risk management strategies but also drives ongoing improvements in IT performance\, aligning technology efforts with broader business objectives. \nThis structured process empowers businesses to adapt to dynamic challenges\, optimize resources\, and maintain resilience in a constantly evolving digital landscape. \nTRAINING OBJECTIVES:\n\nAble to Defines Process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives and deciding what countermeasures Design high-performance and cloud applications to support scalable online services\nLearn to identify issues in processes and design big data processing applications to efficiently handle high-volume and high-velocity data.\nAble describe the road-mapping of risk management as related to IT processes; the framework will be based on the CMM maturity level concept.\n\nWHO SHOULD ATTEND:\n\nIT Managers\, Supervisors\, IT Security Officers\nChief Information Officers (CIOs)\nSystem Administrators & Network Engineers\nCompliance Officers\, Internal & External Auditors\nBusiness Continuity & Disaster Recovery Teams\nProject Managers handling IT-related projects\nData Protection Officers\n\nCOURSE OUTLINE:\n1. Introduction\n\nDefinition and importance of IT-RM.\nKey objectives and benefits.\nOverview of the risk management lifecycle.\n\n2. Understanding IT Risks and Processes\n\nIdentifying and classifying information assets.\nAssessing threats and vulnerabilities.\nPrioritizing risks based on likelihood and impact.\n\n3. Risk Indicators and Their Applications\n\nOperational risks: Safeguarding IT infrastructure.\nProject risks: Managing complexities in IT projects.\nStrategic risks: Aligning IT with business strategies.\n\n4. Building a Loss Event Database\n\nDocumenting intentional and unintentional data loss events.\nStrategies to prevent data loss.\nRecovery and cost management in case of data loss.\n\n5. Establishing Effective Risk Management Programs\n\nDefining the purpose of a risk management program.\nAssigning roles and responsibilities.\nKey steps for implementation and success.\n\n6. Risk Management Maturity\n\nIntroduction to Capability Maturity Model (CMM).\nAssessing current maturity levels.\nRoadmap for achieving advanced risk management maturity.\n\n7. IT Governance and Risk Management\n\nRole of IT governance in risk mitigation.\nResource allocation and cost-effective strategies.\nMonitoring and controlling adverse events.\n\n8. Real-World IT-RM Cases\n\nCase studies highlighting successful risk mitigation.\nLessons learned from failures.\nInnovative practices in risk management.\n\n9. Best Practices and Tools for IT-RM\n\nOverview of industry standards (e.g.\, ISO/IEC 27001).\nTools and technologies to support risk management.\nContinuous improvement and adaptability.\n\n10. Final Assessment and Certification\n\nGroup discussions and scenario analysis.\nPractical assignments based on course content.\nCertification of completion.\n\nABOUT THE COURSE LEADERS:\nAndika Bayu Saputra\, S.Kom\, M.Kom\, Pada tahun 2013 mendapatkan gelar master (S2) dibidang IT dengan predikat memuaskan di program pasca sarjana Magister Teknik Informatika FTI UII. \nMenjadi Consultant IT sejak 2013 dan banyak menangani proyek yang berkaitan dengan IT. Selain sebagai akademisi dan praktisi dibidang IT juga sering memberikan pelatihan dan certified dibidang IT. \nPublic Training berikutnya : 12 – 13 Oktober\, 2026
URL:https://smart-training-center.com/event/it-risk-management-2/
LOCATION:Jakarta
CATEGORIES:Information Technology,Manajemen,Q-HSE
ATTACH;FMTTYPE=image/jpeg:https://smart-training-center.com/wp-content/uploads/2024/11/it-risk-management.jpg
ORGANIZER;CN="PT Fiqry Jaya Manunggal":MAILTO:info@fiqry.com
END:VEVENT
END:VCALENDAR