Á¤º¸¾È³»°øÁö»çÇ×
Á¦18ȸ ISACA Áö½Ä ÆÄ¿öƯ°­ ¾È³» 
 

Á¦ 18ȸ ISACA Áö½Ä ÆÄ¿öƯ°­ ¾È³»

(7¿ù 1¹ø° ¿ÀÇÁ¶óÀÎ ¼¼¹Ì³ª)

¾È³çÇϼ¼¿ä

ISACA KoreaÀÇ Á¦ 2±â ÆÄ¿ö Ư°­ÀÌ ÁøÇàµÇ°í ÀÖ½À´Ï´Ù. À̹ø Ư°­Àº 7¿ù 1¹ø° ¿ÀÇÁ¶óÀΠƯ°­ÀÔ´Ï´Ù.  ISACA¿¡¼­´Â 2009³â 3¿ùºÎÅÍ ¿©Àǵµ¿Í °­³²À» Áß½ÉÀ¸·Î ¿ù 2ȸ Ư°­À¸·Î È®´ëÇÏ¿© ½Ç½ÃÇÕ´Ï´Ù. µû¶ó¼­ ÆÄ¿öƯ°­¿¡ Âü¿©ÇÏ°íÀÚ ÇÏ´Â ºÐµéÀº ¿ù Áß Æí¸®ÇÑ ½Ã°£¿¡ Âü¿©ÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù. ÀÌ´Â ISACA½Ç¹«Áö½ÄÀÇ °¡Ä¡¸¦ ±¸ÇöÇÏ°í º¸±ÞÇÏ´Â µ¥ ¾ÕÀå¼­°íÀÚ, º¸´Ù ¸¹Àº ºÐµé¿¡°Ô Áö½Ä °øÀ¯ÀÇ ±âȸ¸¦ Á¦°øÇÏ·Á´Â ISACA ¸ñÇ¥¸¦ ½ÇÇöÇϱâ À§ÇÔÀÔ´Ï´Ù.

 

1. ISACA Áö½ÄÀ» °¡Áö°í ÀÚÀ¯·Ó°Ô Åä·ÐÇÏ´Â Á¦ 2±â ÆÄ¿öƯ°­¿¡ ´ëÇؼ­ ¾È³»ÇØ µå¸®°Ú½À´Ï´Ù.

2. µ¿ÀÏÇÑ ±âº»¼­ Áß½ÉÀÇ SessionÀÌ ¿ù 2ȸ ¿­¸³´Ï´Ù. ù ¹ø° ½Ã°£¿¡´Â ±âº»¼­ÀÇ ÇϳªÀ̸ç, Á¤º¸

 º¸È£ÀÇ ÅëÁ¦ ¸ñÇ¥¸¦ ´Þ¼ºÇϱâ À§ÇÑ °¡À̵åÀÎ ¡°Information Security Governance¡± ÀÇ ³»¿ëÀ»

»ìÆì º¸°Ú½À´Ï´Ù.

3. µÎ ¹ø° Ư°­Àº Val IT¿¡ ´ëÇÑ ½Ç¹«Áö½ÄÀ» ¾Ë¾Æº¸´Â ½Ã°£À¸·Î, ¡°Val ITÀÇ ½Ç¹«°¡Ä¡¡±¿¡ ´ëÇÑ ¹ßÇ¥°¡

À̾îÁý´Ï´Ù. Val IT°¡ ¾î¶² ´Ù¾çÇÑ ¹æ¹ýÀ¸·Î ½Ç¹«¿¡ °¡Ä¡¸¦ ºÎ¿©ÇÏ´ÂÁö¿¡ ´ëÇÑ À¯ÀÍÇÑ Áö½ÄÀ»

¾òÀ¸½Ç ÁÙ ¹Ï½À´Ï´Ù.

4. 3¿ùºÎÅÍ »õ·Ó°Ô ¾Æ·¡ ISACA±âº»¼­ 15±ÇÀ» °¡Áö°í 10ȸ¿¡ °ÉÃÄ ÆÄ¿öƯ°­ÀÌ ÁøÇàµÇ°í ÀÖ½À´Ï´Ù.

ÀÌ ±âº»¼­µéÀº www.isaca.org¿¡¼­ PDFÆÄÀÏÀ» ¹«·á·Î ³»·Á ¹ÞÀ» ¼ö ÀÖ½À´Ï´Ù. ¿©·¯ºÐµµ ÇÔ²² ¸Å´Þ

ÆÄ¿öƯ°­ Áøµµ¿¡ ¸ÂÃç °øºÎÇØ ³ª°¡½Ã±â ¹Ù¶ø´Ï´Ù.

 

-ISACA±âº»¼­ 15±Ç ¸ñ·Ï-

* ÆÄ¿öƯ°­ (15±Ç)   ¢Ñ ´Ù¿î·Îµå ÆäÀÌÁö º¸±â Ŭ¸¯

1. Board Briefing on IT Governance, 2nd Edition

2. CobiT 4.1 

3. COBIT Control Practices: Guidance to Achieve Control Objective for Successful IT Governance,

2nd Edition 

4.0 Aligning COBIT?? 4.1, ITIL?? V3 and ISO/IEC 27002 for Business Benefit

5.0 Information Security Governance: Guidance for Information Security Managers

5.1 Information Security Governance Guidance for Boards of Directors and Executive Management

2nd Edition 

6. CobiT Security Baseline: An Information Security Survival Kit

7.0 Enterprise Value: Governance of IT Investments, The Val IT Framework 2.0

7.1 Enterprise Value: Governance of IT Investments, Getting Started with Value Management

8.0 IT Governance using CobiT and Val IT TIBO Case Study

8.1 Val IT Case Study: Value Governance - police case study

8.2 Enterprise Value: Governance of IT Investments,The ING Case Study

9.0 IT Assurance Guide: Using COBIT

9.1 ITAF: A Professional Practices Framework for IT Assurance

10. IT Governance Implementation Guide: Using COBIT and Val IT, 2nd Edition

 

¾Æ¹«ÂÉ·Ï ½Ç¹«¿¡¼­ ÀÏÇÏ´Â ¿ì¸® ȸ¿ø ¿©·¯ºÐ¿¡°Ô º» Ư°­ÀÌ ¿©·¯¸ð·Î È°¿ëµÉ ¼ö Àֱ⠹ٶø´Ï´Ù.

 

°¨»çÇÕ´Ï´Ù.

2009. 7. 8.

ISACA Korea   

 

 

ÀÏ ½Ã

2009³â 7¿ù 13ÀÏ (¿ù) Àú³á 7:00 ~ 9:30

Àå ¼Ò

Çѱ¹ HP °Ç¹° 20Ãþ ¼¼¹Ì³ª ·ë (5È£¼± ¿©Àǵµ ¿ª 3¹ø Ãⱸ) ¢Ñ ¾àµµº¸±â

¼ø ¼­

½Ã°£

³»¿ë

¹ßÇ¥ÀÚ

7:00 ~ 7:20

Âü¼® µî·Ï°ú È¸¿ø ±³·ù

Âü¿©ÀÚ Àü¿ø

7:20 ~ 7:30

ISACAÁö½Ä°ú ÆÄ¿öƯ°­ ¼Ò°³

±è¿µÈÆ

(¿¬±¸È¸ ÀÌ»ç)

7:30 ~ 8:00

ISACA ½Ç¹«Áö½Ä:  ¡°Val ITÀÇ ½Ç¹«°¡Ä¡¡±

½Å¼º (Çùȸ ºÎȸÀå)

8:00 ~ 8:10

ÈÞ½Ä

Âü¿©ÀÚ Àü¿ø

8:00 ~ 9:00

ISACA ±âº»¼­ Ư°­: ¡°Information Security Governance¡±

ÀÌ¿µ°æ (Çùȸ °£»ç)

CPE

2 ½Ã°£

Âü°¡½Åû

¼±Âø¼ø 80¸í Âü¼® °¡´É

ȸ¿øÀ̶ó ÇÔÀº ȸ¿øºñ¿ëÀ» ³»½Ã°í °¡ÀÔÇϽŠISACA Global ȸ¿ø, ±¹³» ¹ýÀÎȸ¿ø, ±¹³» °³ÀÎȸ¿øÀ» ÁöĪÇÕ´Ï´Ù.

ISACA ȸ¿øÀÏ °æ¿ì Membership ID / ¹ýÀÎȸ¿øÀÏ °æ¿ì ¹ýÀλç¸íÀ» Àû¾îÁֽñ⠹ٶø´Ï´Ù.
ȨÆäÀÌÁö ȸ¿ø ¹× »ó±âÇÑ ISACAȸ¿øÀÌ ¾Æ´Ñ ¿¬±¸È¸ ȸ¿øÀº ºñȸ¿øÀ¸·Î °£ÁÖÇÕ´Ï´Ù.

û°­ °­Á ¼ö¿Í °ü°è¾øÀÌ Âü°¡µî·ÏÀº µ¿ÀÏÇÕ´Ï´Ù.

½Åû¼­¸¦ ´Ù¿î·Îµå Çϼż­ »ç¹«±¹(isacak@isaca.or.kr)·Î º¸³»Áֽñ⠹ٶø´Ï´Ù.
¢Ñ (½Åû¼­´Ù¿î·Îµå)
±×¸®°í ÇöÀå¿¡¼­ Ãâ¼®ºÎ¿¡ ¼­¸íÇØÁÖ¼Å¾ß CPE°¡ ÀÎÁ¤µË´Ï´Ù.

*  ¿øÄ¢ÀûÀ¸·Î ¼¼¹Ì³ª ¹ßÇ¥ÀÚ·á´Â ¼¼¹Ì³ª ÇöÀå¿¡¼­ ¹èÆ÷ÇÏÁö ¾Ê½À´Ï´Ù.
(
¼¼¹Ì³ª ½Åû¼­¿¡ Àû¾îÁֽŠÀ̸ÞÀÏ ÁÖ¼Ò·Î ¹ß¼ÛÇϸç Ãâ·ÂÇؼ­  ¹Ì¸® ³»¿ëÀ» »ìÆ캸½Ã°í ´çÀÏ¿¡
 
ÁöÂüÇÏ¿© Âü¼®ÇØÁֽñ⠹ٶø´Ï´Ù.  Á¤È®ÇÑ À̸ÞÀÏ ÁÖ¼Ò ±âÀ縦 ºÎŹ µå¸³´Ï´Ù)

* Âü°¡½ÅûÁ¢¼ö´Â 2009³â 7¿ù 10ÀÏ(±Ý)±îÁöÀ̸ç, ÀÔ±Ý ÈÄ È¯ºÒÀº ºÒ°¡ÇÕ´Ï´Ù. ´Ü, ŸÀÎ ¾çµµ´Â °¡´ÉÇÕ´Ï´Ù.

Âü°¡ºñ

¡¤  ISACA ȸ¿ø : ¹«·á

¡¤  ºñȸ¿ø : 10,000 ¿ø

¡¤  Âü°¡ºñ ÀԱݰèÁ : ¿ÜȯÀºÇà 061-22-01166-4
         
¿¹±ÝÁÖ : (»ç)Çѱ¹Á¤º¸½Ã½ºÅÛ°¨»çÅëÁ¦Çùȸ

           (
ÀÔ±ÝÀÚ¸íÀ» º»ÀÎ À̸§À¸·Î º¸³»Áֽñ⠹ٶø´Ï´Ù.)

¹®ÀÇó

¡¤  ÀüÈ­ : 02-2026-3820

¡¤  À̸ÞÀÏ : isacak@isaca.or.kr