Á¦14ȸ ISACA Áö½Ä ÆÄ¿öƯ°¾È³»(5¿ù 1¹ø° ¿ÀÇÁ¶óÀÎ ¼¼¹Ì³ª)
¾È³çÇϼ¼¿ä?
ISACA KoreaÀÇ Á¦ 2±â ÆÄ¿ö Ư°ÀÌ ÁøÇàµÇ°í ÀÖ½À´Ï´Ù. À̹ø Ư°Àº 5¿ù 1¹ø° ¿ÀÇÁ¶óÀΠƯ°ÀÔ´Ï´Ù. ISACA¿¡¼´Â 2009³â 3¿ùºÎÅÍ ¿©Àǵµ¿Í °³²À» Áß½ÉÀ¸·Î ¿ù 2ȸ Ư°À¸·Î È®´ëÇÏ¿© ½Ç½ÃÇÕ´Ï´Ù. µû¶ó¼ ÆÄ¿öƯ°¿¡ Âü¿©ÇÏ°íÀÚ ÇÏ´Â ºÐµéÀº ¿ù Áß Æí¸®ÇÑ ½Ã°£¿¡ Âü¿©ÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù. ÀÌ´Â ISACA½Ç¹«Áö½ÄÀÇ °¡Ä¡¸¦ ±¸ÇöÇÏ°í º¸±ÞÇÏ´Â µ¥ ¾ÕÀå¼°íÀÚ, º¸´Ù ¸¹Àº ºÐµé¿¡°Ô Áö½Ä °øÀ¯ÀÇ ±âȸ¸¦ Á¦°øÇÏ·Á´Â ISACA ¸ñÇ¥¸¦ ½ÇÇöÇϱâ À§ÇÔÀÔ´Ï´Ù.
1. ISACA Áö½ÄÀ» °¡Áö°í ÀÚÀ¯·Ó°Ô Åä·ÐÇÏ´Â Á¦ 2±â ÆÄ¿öƯ°¿¡ ´ëÇؼ ¾È³»ÇØ µå¸®°Ú½À´Ï´Ù.
2. µ¿ÀÏÇÑ ±âº»¼ Áß½ÉÀÇ SessionÀÌ ¿ù 2ȸ ¿¸³´Ï´Ù. À̹ø ½Ã°£¿¡´Â ±âº»¼ÀÇ ÇϳªÀ̸ç, ¼º°øÀûÀÎ IT GovernanceÀÇ ÅëÁ¦ ¸ñÇ¥¸¦ ´Þ¼ºÇϱâ À§ÇÑ °¡À̵åÀÎ ¡°CobiT Control Practices¡± ÀÇ ³»¿ëÀ» »ìÆì º¸°Ú½À´Ï´Ù.
3. IT Governance¿¡ ´ëÇÑ È°¿ë »ç·Ê·Î, ¡°IT GovernanceÀÇ ÀÌÇØ¿Í Àû¿ë ¹æ¾È¡±¿¡ ´ëÇÑ ¹ßÇ¥°¡ À̾îÁý´Ï´Ù. IT Governance°¡ ¾î¶² ´Ù¾çÇÑ ¹æ¹ýÀ¸·Î ½Ç¹«¿¡ Àû¿ëµÇ´ÂÁö¿¡ ´ëÇÑ À¯ÀÍÇÑ Áö½ÄÀ» ¾òÀ¸½Ç ÁÙ ¹Ï½À´Ï´Ù.
4. 3¿ùºÎÅÍ »õ·Ó°Ô ¾Æ·¡ ISACA±âº»¼ 15±ÇÀ» °¡Áö°í 10ȸ¿¡ °ÉÃÄ ÆÄ¿öƯ°ÀÌ ÁøÇàµÇ°í ÀÖ½À´Ï´Ù. ÀÌ ±âº»¼µéÀº www.isaca.org¿¡¼ PDFÆÄÀÏÀ» ¹«·á·Î ³»·Á¹ÞÀ» ¼ö ÀÖ½À´Ï´Ù. ¿©·¯ºÐµµ ÇÔ²² ¸Å´Þ ÆÄ¿öƯ° Áøµµ¿¡ ¸ÂÃç °øºÎÇØ ³ª°¡½Ã±â ¹Ù¶ø´Ï´Ù.
-ISACA±âº»¼ 15±Ç ¸ñ·Ï-
* ÆÄ¿öƯ° (15±Ç) ¢Ñ ´Ù¿î·Îµå ÆäÀÌÁö º¸±â Ŭ¸¯
1. Board Briefing on IT Governance, 2nd Edition
2. CobiT 4.1
3. COBIT Control Practices: Guidance to Achieve Control Objective for Successful IT Governance,
2nd Edition
4.0 Aligning COBIT?? 4.1, ITIL?? V3 and ISO/IEC 27002 for Business Benefit
5.0 Information Security Governance: Guidance for Information Security Managers
5.1 Information Security Governance Guidance for Boards of Directors and Executive Management
6. CobiT Security Baseline: An Information Security Survival Kit
7.0 Enterprise Value: Governance of IT Investments, The Val IT Framework 2.0
7.1 Enterprise Value: Governance of IT Investments, Getting Started with Value Management
8.0 IT Governance using CobiT and Val IT TIBO Case Study
8.1 Val IT Case Study: Value Governance - police case study
8.2 Enterprise Value: Governance of IT Investments,The ING Case Study
9.0 IT Assurance Guide: Using COBIT
9.1 ITAF: A Professional Practices Framework for IT Assurance
10. IT Governance Implementation Guide: Using COBIT and Val IT, 2nd Edition
¾Æ¹«ÂÉ·Ï ½Ç¹«¿¡¼ ÀÏÇÏ´Â ¿ì¸® ȸ¿ø ¿©·¯ºÐ¿¡°Ô º» Ư°ÀÌ ¿©·¯¸ð·Î È°¿ëµÉ ¼ö Àֱ⠹ٶø´Ï´Ù.
°¨»çÇÕ´Ï´Ù.
2009. 5. 11.
ISACA Korea
ÀÏ ½Ã
2009³â 5¿ù 18ÀÏ (¿ù) Àú³á 7:00 ~ 9:30
Àå ¼Ò
Çѱ¹ HP °Ç¹° 20Ãþ ¼¼¹Ì³ª ·ë (5È£¼± ¿©Àǵµ ¿ª 3¹ø Ãⱸ) ¢Ñ ¾àµµº¸±â
¼ø ¼
½Ã°£
³»¿ë
¹ßÇ¥ÀÚ
7:00 ~ 7:20
Âü¼® µî·Ï°ú ȸ¿ø ±³·ù
Âü¿©ÀÚ Àü¿ø
7:20 ~ 7:30
ISACAÁö½Ä°ú ÆÄ¿öƯ° ¼Ò°³
±è¿µÈÆ
(¿¬±¸È¸ ÀÌ»ç)
7:30 ~ 8:15
ISACA IT °Å¹ö³Í½º ½Ç¹«Áö½Ä : ¡°CobiT Control Practices¡±
¾ö±¹Çö
(ISACA ȸ¿ø)
8:15 ~ 8:25
ÈÞ½Ä
8:25 ~ 9:30
ISACA IT°Å¹ö³Í½º »ç·Ê ¹ßÇ¥: ¡°IT°Å¹ö³Í½ºÀÇ ÀÌÇØ¿Í Àû¿ë¹æ¾È¡±
ÀüÈ£¿µ ºÎÀå
(»ïÀÏPWC)
CPE
2 ½Ã°£
Âü°¡½Åû
¼±Âø¼ø 80¸í Âü¼® °¡´Éȸ¿øÀ̶ó ÇÔÀº ȸ¿øºñ¿ëÀ» ³»½Ã°í °¡ÀÔÇϽŠISACA Global ȸ¿ø, ±¹³» ¹ýÀÎȸ¿ø, ±¹³» °³ÀÎȸ¿øÀ» ÁöĪÇÕ´Ï´Ù. ISACA ȸ¿øÀÏ °æ¿ì Membership ID / ¹ýÀÎȸ¿øÀÏ °æ¿ì ¹ýÀλç¸íÀ» Àû¾îÁֽñ⠹ٶø´Ï´Ù.ȨÆäÀÌÁö ȸ¿ø ¹× »ó±âÇÑ ISACAȸ¿øÀÌ ¾Æ´Ñ ¿¬±¸È¸ ȸ¿øÀº ºñȸ¿øÀ¸·Î °£ÁÖÇÕ´Ï´Ù.û° °Á ¼ö¿Í °ü°è¾øÀÌ Âü°¡µî·ÏÀº µ¿ÀÏÇÕ´Ï´Ù.½Åû¼¸¦ ´Ù¿î·Îµå Çϼż »ç¹«±¹(isacak@isaca.or.kr)·Î º¸³»Áֽñ⠹ٶø´Ï´Ù.¢Ñ (½Åû¼´Ù¿î·Îµå) ±×¸®°í ÇöÀå¿¡¼ Ãâ¼®ºÎ¿¡ ¼¸íÇØÁÖ¼Å¾ß CPE°¡ ÀÎÁ¤µË´Ï´Ù.
* ¿øÄ¢ÀûÀ¸·Î ¼¼¹Ì³ª ¹ßÇ¥ÀÚ·á´Â ¼¼¹Ì³ª ÇöÀå¿¡¼ ¹èÆ÷ÇÏÁö ¾Ê½À´Ï´Ù. (¼¼¹Ì³ª ½Åû¼¿¡ Àû¾îÁֽŠÀ̸ÞÀÏ ÁÖ¼Ò·Î ¹ß¼ÛÇϸç Ãâ·ÂÇؼ ¹Ì¸® ³»¿ëÀ» »ìÆ캸½Ã°í ´çÀÏ¿¡ ÁöÂüÇÏ¿© Âü¼®ÇØÁֽñ⠹ٶø´Ï´Ù. Á¤È®ÇÑ À̸ÞÀÏ ÁÖ¼Ò ±âÀ縦 ºÎŹ µå¸³´Ï´Ù) * Âü°¡½ÅûÁ¢¼ö´Â 2009³â 5¿ù 15ÀÏ(±Ý)±îÁöÀ̸ç, ÀÔ±Ý ÈÄ È¯ºÒÀº ºÒ°¡ÇÕ´Ï´Ù. ´Ü, ŸÀÎ ¾çµµ´Â °¡´ÉÇÕ´Ï´Ù.
Âü°¡ºñ
¡¤ ISACA ȸ¿ø : ¹«·á
¡¤ ºñȸ¿ø : 10,000 ¿ø
¡¤ Âü°¡ºñ ÀԱݰèÁ : ¿ÜȯÀºÇà 061-22-01166-4 ¿¹±ÝÁÖ : (»ç)Çѱ¹Á¤º¸½Ã½ºÅÛ°¨»çÅëÁ¦Çùȸ (ÀÔ±ÝÀÚ¸íÀ» º»ÀÎ À̸§À¸·Î º¸³»Áֽñ⠹ٶø´Ï´Ù.)
¹®ÀÇó
¡¤ ÀüÈ : 02-2026-3820
¡¤ À̸ÞÀÏ : isacak@isaca.or.kr