If you already have an account on MEPC you don't need to fill out registration form to create a new account. Simply login using your MEPC username or email address and password.
As cyber threats grow more sophisticated in this digital age, organizations will need to stay one step ahead by anticipating future attacks and actively defending their networks. To do so, they will need to hire security specialists such as cyber security managers.Tasked with developing strategic and tactical plans for information security in an organization, a Cyber Security Manager identifies key security initiatives and programmes through a risk-based approach. A key role is to establish the organization’s governance framework for information security to ensure that the security strategies are consistent with applicable laws and regulations. Roles and Responsibilities :
Analyze and correlate information security events to identify appropriate event handling actions.
Assess operational and implementation costs, and evaluate them against the potential business impact if the policies and controls are not implemented
Assess the effectiveness of the measures against security risk management plan
Develop IT security policy and operational procedures based on information collected
Develop a documented action plan containing policies, practices and procedures that mitigate the identified risks
Document information related to IT security attacks, threats, risks and controls
Establish a standard methodology for performing security tests in accordance with security requirements
Establish review procedures based on organization’s security risk management plan
Evaluate effectiveness of current incident response plan against industry good practices
Evaluate response plans periodically to ensure relevance
Identify threats and risks that are relevant to organization’s operations and systems
Monitor the effectiveness of action plans in addressing information risks
Obtain corporate management's endorsement of security policies, standards and procedures by articulating cost and benefits
Perform comparative analysis of security service performance level parameters against security information sources
Prepare information security performance report based on results from analysis and correlation of information security events
Rate and categorizes potential security incidents
Recommend suitable enhancements to improve information security performance
Review business and security environment to identify existing requirements
Review security policies, standards and procedures by considering the threats identified and other information collected
Test incident response plans periodically to ensure response times and executed procedures are acceptable.