Functional Management and Information Security Training

This two-day training gives functional administrators practical grip on information security within application management, from theory to concrete management plans that comply with relevant standards frameworks.

... > Training Courses > Functional Management and Information Security Training

Why this training.

Organizations rely on applications to perform their processes efficiently. This often involves working with sensitive and valuable information, such as personal data, financial data, medical records and trade secrets. Properly securing this information, especially within critical applications, is essential to manage risks and comply with laws and regulations.

What this training delivers

Our training helps functional administrators get to grips with the requirements arising from relevant standards frameworks such as ISO 27001, BIO, NEN 7510 and DigiD. You will learn how to translate these requirements into concrete management tasks and secure them in a practical and future-proof management plan. In this way you not only strengthen information security, but also the reliability of your application management. The training gives you:

  • Insight into theoretical frameworks and laws and regulations
  • Clear definition of tasks and responsibilities
  • Drawing up a management plan with a practical template
  • Translation of theory to daily practice
  • Practical tips for audit preparation and execution
Image in image block

For whom.

This training is designed for professionals who are responsible for managing applications within their organization, especially functional administrators, but also application owners and other employees involved in application management.

Structure of the training

The two-day training is structured as follows:

01

Basic concepts of information security

We start with the fundamentals: what is information security and how does it relate to functional management? You will gain insight into the role of application management within the broader security landscape.

02

Policy and organization

You will learn how information security policies apply to application functional management, and how to translate these policies into concrete actions, tasks and responsibilities within your organization.

03

Duties and responsibilities

We clearly map out the roles within application management: who is responsible for what, who executes, who is consulted and who is informed? Hereby we use the RACI model to define responsibilities and involvement around information security and application management in a structured way. You learn how to secure these roles and tasks in processes, documentation and daily implementation, so there is clarity about who performs what and when.

04

Risk Management

You will learn the principles of risk management and how they apply to application functional management.

05

Compliancy and standards frameworks

We cover relevant laws and regulations and standards frameworks such as ISO 27001, NEN 7510, BIO, DigiD and NIS2. You will learn how to comply with these and demonstrate this in your management plan.

06

Accountability and audits

You get practical tools for preparing, conducting and following up audits. Think about DigiD audits or certification processes for ISO 27001 and NEN 7510.

Practical Information
Duration: two-day training course
Certificate: Certificate of attendance
Prior knowledge: No specific prior knowledge required

Delivery options
Incompany training (recommended)
Possibility of in-depth consultation

Material
Presentation
Management plan template
Practical exercises

Learn more

Are you interested in organizing this customized training in your company? Fill out the form below and we will contact you within one business day.

USP

Why choose Bureau Veritas Cybersecurity

Bureau Veritas Cybersecurity is your expert partner in cybersecurity. We help organizations identify risks, strengthen defenses and comply with cybersecurity standards and regulations. Our services cover people, processes and technology, ranging from awareness training and social engineering to security advice, compliance and penetration testing.

We operate across IT, OT and IoT environments, supporting both digital systems and connected products. With over 300 cybersecurity professionals worldwide, we combine deep technical expertise with a global presence. Bureau Veritas Cybersecurity is part of the Bureau Veritas Group, a global leader in testing, inspection and certification.