IT Risk Management

IT Risk Management

This course deals with how IT helps to achieve an appropriate balance between realizing opportunities for gains while minimizing losses. It is an integral part of good management practice and an essential element of good corporate governance. It is an iterative process consisting of steps that, when undertaken in sequence, enable continuous improvement in IT decision-making and facilitate continuous improvement in IT performance.

Objectives & Benefits

IT risk management course covers how to establish an appropriate infrastructure and culture and apply a logical and systematic method of establishing the context, identifying, analyzing, evaluating, treating, monitoring and communicating IT risks associated with any activity, function or process in a way that will enable organizations to minimize losses and maximize gains. At the completion of this course, the participants should be able to :

  • Conceptualize organizations risk management within IT processes
  • Identify and analyze risks within IT operations and understand the implications to the whole business operation
  • Improve IT operation risk level thru  the application and implementation of IT risk management methodology and best practices
  • Support the attainment of organizational business objectives by providing comprehensive perspective of IT risk management to the executive management of the organization
  • Plan to  implement tool  for identifying, analyzing, eradicating and communicating the risks within the cycle of risk management

Target Audience

  • Managers involved and related in the IT operations
  • IT staff and executives involved in risk management and  business process improvement
  • Information technology professionals involved in projects that are concerned, in part, with the automation of business processes
  • IT professionals especially from companies regulated to implement risk management and IT risk management such as banks and state-owned enterprises.

Course Content

  1. Risk Management Introduction
    The segment defines Process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives and deciding what countermeasures
  2. Risk Management Processes
    The participants learn to recognize the following issues in the risk management processes such as:

    • Identification and classification of information resources or assets that need protection
    • Assess threats and vulnerabilities and the likelihood of their occurrence Identification and classification of information resources or assets that need protection
    • Assess threats and vulnerabilities and the likelihood of their occurrence
  3. Risk Indicators
    This  segment shall describe on the need of IT risk management  to operate at multiple levels with diversified risk indicators including:

    • Operation: risks that could compromise the effectiveness of IT systems and supporting infrastructure
    • Project:  risks management needs to focus on the ability to understand and manage project complexity
    • Strategic:  the risk focus shifts to considerations such as how well the IT capability is aligned with the business strategy
  4. Loss Event Database
    The segment shall describe to the participants on intentional and unintentional action that causes data loss, and highlight on organizational responsibility such as:

    • preventing data loss
    • recovery from data loss
    • Cost of data loss
  5. Effective Risk Management
    This segment shall describe to the participants how to establish effective risk management program that covers:

    • Establish purpose of the risk management program
    • Assign the responsibility for the risk management
  6. Risk Management Maturity
    This segment shall describe the road-mapping of risk management as related to IT processes; the framework will be based on the CMM maturity level concept.
  7. IT Risk Management
    This segment shall describe on the Information Technology risk management which is part of the organization IT governance encompassing such as: the identification, assessment, and prioritization of IT operation risks, and  followed by coordinated and economical application of IT resources to minimize, monitor, and control the probability and/or impact of unfortunate events.
  8. Cases Study: IT risk management cases

Permintaan Brosur penawaran Training ( Waktu dan Tempat) silahkan Menghubungi kami

Catatan :

  • Pelatihan ini dapat di-customized sesuai kebutuhan perusahaan Anda bila diselenggarakan dalam bentuk In-House Training. Untuk permintaan In-House Training dengan jenis topik lainya, silahkan mengirimkan ke alamat email yang tercantum di web kami.
  • Request Training. Jika anda membutuhkan informasi pelatihan yang belum tercantum pada website ini, atau anda ingin memberikan usulan materi yang sesuai dengan tingkat kebutuhan perusahaan anda, silahkan mengirimkan ke alamat email yang tercantum.
  • Bila tidak ada tanggal dan waktu atau yang tercantum sudah kadaluarsa didalam artikel mohon tanyakan kepada kami untuk jadwal terbarunya.

Purchasing Fraud: Prevention, Detection And Solution

Purchasing Fraud: Prevention, Detection And Solution

Pada Pelatihan ini akan diuraikan secara sistematis dan lengkap mengenai skema kecurangan dalam purchasing mulai dari pencegahan, pendeteksian, dan investigasinya.

Untuk memudahkan pemahaman peserta, Pelatihan ini disajikan dengan metoda lecture, studi kasus, dan diskusi interaktif / kelompok

Pelatihan untuk Anda:

  • Auditors who want to help management fight fraud in purchasing.
  • Internal auditors who want to detect purchasing fraud.
  • Investigators who want to prove kickbacks and other types of purchasing fraud

Pelatihan ini bertujuan untuk:

  • Learn the real fraud exposures in purchasing.
  • Understand why purchasing fraud is so difficult to detect and respond to.
  • Identify specific steps some organizations take to reduce exposures to purchasing-related fraud.
  • Discover practical approaches to detect purchasing fraud.
  • Explore proven techniques for investigating purchasing fraud.

Pokok-Pokok Bahasan

  1. Introduction to Purchasing Fraud
  2. Understanding and Shaping Your Environment
  3. Detecting Purchasing Fraud
  4. Cultural Considerations
  5. Purchasing Outside of Traditional Procurement
  6. Areas Meriting Additional Consideration
  7. Investigating – Responding to Suspected Wrongdoing
  8. Contracting & the Prevention of Purchasing Fraud
  9. Case Study and Sharing Experience

 

Permintaan Brosur penawaran Training ( Waktu dan Tempat) silahkan Menghubungi kami

Catatan :

  • Pelatihan ini dapat di-customized sesuai kebutuhan perusahaan Anda bila diselenggarakan dalam bentuk In-House Training. Untuk permintaan In-House Training dengan jenis topik lainya, silahkan mengirimkan ke alamat email yang tercantum di web kami.
  • Request Training. Jika anda membutuhkan informasi pelatihan yang belum tercantum pada website ini, atau anda ingin memberikan usulan materi yang sesuai dengan tingkat kebutuhan perusahaan anda, silahkan mengirimkan ke alamat email yang tercantum.
  • Bila tidak ada tanggal dan waktu atau yang tercantum sudah kadaluarsa didalam artikel mohon tanyakan kepada kami untuk jadwal terbarunya.

Informasi Jadwal training 2016 | 2017 | 2018 | 2019 | 2020 | 2021 | 2022 | di Yogyakarta, Jakarta, Bandung, Bogor, Surabaya, Malang, Bali, Lombok, Balikpapan, Makassar, Medan, Batam, Riau, Pontianak, Semarang, Solo, Manado, dan Kota-kota lainnya

Radiation Protection and Safety of Radiation

Informasi Jadwal Pelatihan – Radiation Protection and Safety of Radiation

Course Description

A two steps course designed to meet the requirements of the accreditation body and is so structured to meet national requirements and recommendations and is ideal for all radiography examination routes which may contain basic radiation safety content such as ASNT, NAS410 and BGAS-CSWIP.

Course Objective

Understand the nature of ionizing and non ionizing radiations, their qualitative and quantitative physical effects.
Understand the principles of radiation protection and become familiar with practical radiation protection techniques.
Recognize the different types of radiation hazards and the principles of their risk assessments.
Be aware of the legislations which define the responsibilities of the person dealing with radiation and how radiation protection fits in the regulatory framework.
Recognize the implications of radiation incidents and appreciate th eimportance of contigency planning and how it is related to risk assessment.

Who Should attend?

All people who work directly on or in the vicinity of ionizing or non ionizing radiation sources as well as managers, supervisors and support staff.

• Radiation Safety Officers in Testing Laboratories, Academic Laboratories, Oil industry and Medical Organizations.

• Radiation Personnel (Employees working in or frequenting any portion of a restricted radiation area).

• Senior disaster preparedness personnel and operational planners.

• Civil defense and military personnel.

Course Outline

(Basic radiation physics)

Radiation
Absorption and scattering
The photoelectric effect
Compton scattering
HVL
Particulate radiation

(Radiographic and radiation monitoring equipment)

Radiographic equipment (x-ray)
Radiographic equipment (gamma-ray)
Radiation units
Dose limits
Radiation monitoring
Personal dosimeter
Dose limitation

(Radiation Protection)

Biological effects
Radiation detection and Measurement
Protection against radiation
Principles and practices of radiation protection
Calculations for radiation protection

(Radiation Materials)

Storage of radiation sources
Transport of radioactive substances
Emergency procedures
Transport of radioactive substances
The role of the RPA and RPS
Appointments and responsibilities
Local Rules and contingency (Emergency) plans

(Regulations and Standards)

Normative documents
Normative documents and legislative structure
Radioactive Substances Act 1993
The lionizing Radiations Regulations
Review of basic radiation safety
The regulation of work with radiation

Permintaan Brosur penawaran Training ( Waktu dan Tempat) silahkan Menghubungi kami

Catatan :

  • Pelatihan ini dapat di-customized sesuai kebutuhan perusahaan Anda bila diselenggarakan dalam bentuk In-House Training. Untuk permintaan In-House Training dengan jenis topik lainya, silahkan mengirimkan ke alamat email yang tercantum di web kami.
  • Request Training. Jika anda membutuhkan informasi pelatihan yang belum tercantum pada website ini, atau anda ingin memberikan usulan materi yang sesuai dengan tingkat kebutuhan perusahaan anda, silahkan mengirimkan ke alamat email yang tercantum.
  • Bila tidak ada tanggal dan waktu atau yang tercantum sudah kadaluarsa didalam artikel mohon tanyakan kepada kami untuk jadwal terbarunya.

Informasi Jadwal training 2016 | 2017 | 2018 | 2019 | 2020 | 2021 | 2022 | di Yogyakarta, Jakarta, Bandung, Bogor, Surabaya, Malang, Bali, Lombok, Balikpapan, Makassar, Medan, Batam, Riau, Pontianak, Semarang, Solo, Manado, dan Kota-kota lainnya