Functional Management and Information Security Training
This two-day training gives functional administrators practical grip on information security within application management, from theory to concrete management plans that comply with relevant standards frameworks.
... > Training Courses > Functional Management and Information Security Training
Why this training.
Organizations rely on applications to perform their processes efficiently. This often involves working with sensitive and valuable information, such as personal data, financial data, medical records and trade secrets. Properly securing this information, especially within critical applications, is essential to manage risks and comply with laws and regulations.
What this training delivers
Our training helps functional administrators get to grips with the requirements arising from relevant standards frameworks such as ISO 27001, BIO, NEN 7510 and DigiD. You will learn how to translate these requirements into concrete management tasks and secure them in a practical and future-proof management plan. In this way you not only strengthen information security, but also the reliability of your application management. The training gives you:
- Insight into theoretical frameworks and laws and regulations
- Clear definition of tasks and responsibilities
- Drawing up a management plan with a practical template
- Translation of theory to daily practice
- Practical tips for audit preparation and execution
For whom.
This training is designed for professionals who are responsible for managing applications within their organization, especially functional administrators, but also application owners and other employees involved in application management.
Structure of the training
The two-day training is structured as follows:
01
Basic concepts of information security
We start with the fundamentals: what is information security and how does it relate to functional management? You will gain insight into the role of application management within the broader security landscape.
02
Policy and organization
You will learn how information security policies apply to application functional management, and how to translate these policies into concrete actions, tasks and responsibilities within your organization.
03
Duties and responsibilities
We clearly map out the roles within application management: who is responsible for what, who executes, who is consulted and who is informed? Hereby we use the RACI model to define responsibilities and involvement around information security and application management in a structured way. You learn how to secure these roles and tasks in processes, documentation and daily implementation, so there is clarity about who performs what and when.
04
Risk Management
You will learn the principles of risk management and how they apply to application functional management.
05
Compliancy and standards frameworks
We cover relevant laws and regulations and standards frameworks such as ISO 27001, NEN 7510, BIO, DigiD and NIS2. You will learn how to comply with these and demonstrate this in your management plan.
06
Accountability and audits
You get practical tools for preparing, conducting and following up audits. Think about DigiD audits or certification processes for ISO 27001 and NEN 7510.
Practical Information
Duration: two-day training course
Certificate: Certificate of attendance
Prior knowledge: No specific prior knowledge required
Delivery options
Incompany training (recommended)
Possibility of in-depth consultation
Material
Presentation
Management plan template
Practical exercises
Learn more
Are you interested in organizing this customized training in your company? Fill out the form below and we will contact you within one business day.
Why choose Bureau Veritas Cybersecurity
Bureau Veritas Cybersecurity is your expert partner in cybersecurity. We help organizations identify risks, strengthen defenses and comply with cybersecurity standards and regulations. Our services cover people, processes and technology, ranging from awareness training and social engineering to security advice, compliance and penetration testing.
We operate across IT, OT and IoT environments, supporting both digital systems and connected products. With over 300 cybersecurity professionals worldwide, we combine deep technical expertise with a global presence. Bureau Veritas Cybersecurity is part of the Bureau Veritas Group, a global leader in testing, inspection and certification.