Á¤º¸¾È³»°øÁö»çÇ×
Á¦ 20ȸ ISACA Áö½Ä ÆÄ¿öƯ°­ ¾È³» 
   

Á¦ 20ȸ ISACA Áö½Ä ÆÄ¿öƯ°­ ¾È³»

(8¿ù 1¹ø° ¿ÀÇÁ¶óÀÎ ¼¼¹Ì³ª)

¾È³çÇϼ¼¿ä?

ISACA KoreaÀÇ Á¦ 2±â ÆÄ¿ö Ư°­ÀÌ 3¿ùºÎÅÍ ÁøÇà ÁßÀÔ´Ï´Ù. À̹ø Ư°­Àº 8¿ù 1¹ø° ¿ÀÇÁ¶óÀΠƯ°­ÀÔ´Ï´Ù.  ISACA¿¡¼­´Â 2009³â 3¿ùºÎÅÍ ¿©Àǵµ¿Í °­³²À» Áß½ÉÀ¸·Î ¿ù 2ȸ Ư°­À¸·Î È®´ëÇÏ¿© ½Ç½ÃÇÕ´Ï´Ù. µû¶ó¼­ ÆÄ¿öƯ°­¿¡ Âü¿©ÇÏ°íÀÚ ÇÏ´Â ºÐµéÀº ¿ù Áß Æí¸®ÇÑ ½Ã°£¿¡ Âü¿©ÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù. ÀÌ´Â ISACA½Ç¹«Áö½ÄÀÇ °¡Ä¡¸¦ ±¸ÇöÇÏ°í º¸±ÞÇÏ´Â µ¥ ¾ÕÀå¼­°íÀÚ, º¸´Ù ¸¹Àº ºÐµé¿¡°Ô Áö½Ä °øÀ¯ÀÇ ±âȸ¸¦ Á¦°øÇÏ·Á´Â ISACA ¸ñÇ¥¸¦ ½ÇÇöÇϱâ À§ÇÔÀÔ´Ï´Ù.

8¿ù ¿©Àǵµ Ư°­¿¡´Â 7¿ù °­³²Æ¯°­¿¡ À̾î, Çùȸ Ư°­¿¡ Âü¿©ÇϽô ºÐµéÀÌ ¼­·Î ¼Ò°³¸¦ ³ª´©´Â ÀÚ¸®¸¦ ¸¶·ÃÇϵµ·Ï ÇÏ°Ú½À´Ï´Ù. ±× µ¿¾È Ư°­¿¡ Âü¼®ÇϽø鼭 ±Ã±ÝÇϼ̰ųª ÇÏ°í ½ÍÀ¸¼Ì´ø ¾ê±âµéÀ» ÀÚÀ¯·Ó°Ô ³ª´©½Ã±â ¹Ù¶ø´Ï´Ù.

 

1.     ISACA Áö½ÄÀ» °¡Áö°í ÀÚÀ¯·Ó°Ô Åä·ÐÇÏ°í »õ·Ó°Ô ½ÃÀÛÇÒ Á¦ 2±â ÆÄ¿öƯ°­¿¡ ´ëÇؼ­ ¾È³»ÇØ µå¸®°Ú½À´Ï´Ù.

2.     ù ¹ø° ½Ã°£¿¡´Â ±× µ¿¾È Çùȸ ÆÄ¿öƯ°­¿¡ Âü¼®Çϼ̴ø ûÁß ºÐµéÀÌ ¼­·Î ÀÇ°ßµµ ³ª´©°í ¼Ò°³¸¦ ÇÏ´Â ½Ã°£À» °¡Áöµµ·Ï ÇÏ°Ú½À´Ï´Ù. ÀÚ±â¼Ò°³µµ ÇϽðí, Ư°­¿¡ Âü¿©ÇϽŠÀÌÀ¯ ¹× Ư°­¿¡ ¹Ù¶ó°í ½ÍÀ¸½Å Á¡ µîÀ» ¾ê±âÇϽøé ÁÁÀ» °Í °°½À´Ï´Ù.

3.   µÎ ¹ø° ½Ã°£¿¡´Â ¡°CoBiT Security Baseline¡±ÀÇ ³»¿ëÀ» ÀÌÇØÇÏ´Â ½Ã°£À» °¡Áöµµ·Ï ÇÏ°Ú½À´Ï´Ù. Security Issue¿¡ ´ëÇÑ CoBiT-Based Key Control¿¡ ´ëÇØ ÁÁÀº ½Ã»çÁ¡À» ¾òÀ¸½Ã±æ ¹Ù¶ø´Ï´Ù.

4.  3¿ùºÎÅÍ »õ·Ó°Ô ¾Æ·¡ ISACA±âº»¼­ 15±ÇÀ» °¡Áö°í 10ȸ¿¡ °ÉÃÄ ÆÄ¿öƯ°­ÀÌ ÁøÇàµÇ°í ÀÖ½À´Ï´Ù. ÀÌ ±âº»¼­µéÀº www.isaca.org¿¡¼­ PDFÆÄÀÏÀ» ¹«·á·Î ³»·Á ¹ÞÀ» ¼ö ÀÖ½À´Ï´Ù. ¿©·¯ºÐµµ ÇÔ²² ¸Å´Þ ÆÄ¿öƯ°­ Áøµµ¿¡ ¸ÂÃç °øºÎÇØ ³ª°¡½Ã±â ¹Ù¶ø´Ï´Ù.

 

-ISACA±âº»¼­ 15±Ç ¸ñ·Ï-

* ÆÄ¿öƯ°­ (15±Ç)   ¢Ñ ´Ù¿î·Îµå ÆäÀÌÁö º¸±â Ŭ¸¯

1. Board Briefing on IT Governance, 2nd Edition

2. CobiT 4.1 

3. COBIT Control Practices: Guidance to Achieve Control Objective for Successful IT Governance,

2nd Edition 

4.0 Aligning COBIT?? 4.1, ITIL?? V3 and ISO/IEC 27002 for Business Benefit

5.0 Information Security Governance: Guidance for Information Security Managers

5.1 Information Security Governance Guidance for Boards of Directors and Executive Management

2nd Edition 

6. CobiT Security Baseline: An Information Security Survival Kit

7.0 Enterprise Value: Governance of IT Investments, The Val IT Framework 2.0

7.1 Enterprise Value: Governance of IT Investments, Getting Started with Value Management

8.0 IT Governance using CobiT and Val IT TIBO Case Study

8.1 Val IT Case Study: Value Governance - police case study

8.2 Enterprise Value: Governance of IT Investments,The ING Case Study

9.0 IT Assurance Guide: Using COBIT

9.1 ITAF: A Professional Practices Framework for IT Assurance

10. IT Governance Implementation Guide: Using COBIT and Val IT, 2nd Edition

 

¾Æ¹«ÂÉ·Ï ½Ç¹«¿¡¼­ ÀÏÇÏ´Â ¿ì¸® ȸ¿ø ¿©·¯ºÐ¿¡°Ô º» Ư°­ÀÌ ¿©·¯¸ð·Î È°¿ëµÉ ¼ö Àֱ⠹ٶø´Ï´Ù.

 

°¨»çÇÕ´Ï´Ù.

2009. 8. 5.

ISACA Korea   

 

 

ÀÏ ½Ã

2009³â 8¿ù 10ÀÏ (¿ù) Àú³á 7:00 ~ 9:30

Àå ¼Ò

Çѱ¹ HP °Ç¹° 20Ãþ ¼¼¹Ì³ª ·ë (5È£¼± ¿©Àǵµ ¿ª 3¹ø Ãⱸ) ¢Ñ ¾àµµº¸±â

¼ø ¼­

½Ã°£

³»¿ë

¹ßÇ¥ÀÚ

7:00 ~ 7:30

Âü¼® µî·Ï

Âü¿©ÀÚ Àü¿ø

7:30 ~ 8:15

ûÁß °³º° ¼Ò°³ ¹× ȸ¿ø ±³·ù ½Ã°£

Âü¿©ÀÚ °¢°¢

8:15 ~ 9:00

ISACA IT °Å¹ö³Í½º Áö½Ä : ¡°CoBiT Security Baseline¡±
¢Ñ ¹ßÇ¥ÀÚ·á ´Ù¿î·Îµå

À±¿ìÈñ (Çùȸ °£»ç)

CPE

2 ½Ã°£

Âü°¡½Åû

8¿ù ù¹ø° Ư°­Àº º°µµÀÇ ½ÅûÀ» ¹ÞÁö ¾Ê½À´Ï´Ù.
Ư°­¿¡ Âü¿©ÇÏ½Ç ºÐµéÀº ¸íÇÔ°ú ȸ¿ø ID¸¦ Áغñ ¹× È®ÀÎ Çϼż­ Ư°­¿¡ Âü¿©ÇÏ½Ã¸é µË´Ï´Ù
.


ȸ¿øÀ̶ó ÇÔÀº ȸ¿øºñ¿ëÀ» ³»½Ã°í °¡ÀÔÇϽŠISACA Global ȸ¿ø, ±¹³» ¹ýÀÎȸ¿ø, ±¹³» °³ÀÎȸ¿øÀ» ÁöĪÇÕ´Ï´Ù.

ȨÆäÀÌÁö ȸ¿ø ¹× »ó±âÇÑ ISACAȸ¿øÀÌ ¾Æ´Ñ ¿¬±¸È¸ ȸ¿øÀº ºñȸ¿øÀ¸·Î °£ÁÖÇÕ´Ï´Ù.

 

*  ¹ßÇ¥ÀڷḦ ÇöÀå¿¡¼­ ³ª´²µå¸®Áö ¾Ê½À´Ï´Ù.

¹ßÇ¥ÀڷḦ ´Ù¿î·Îµå/Ãâ·ÂÇؼ­ Á÷Á¢ °¡Á®¿À½Ã±â ¹Ù¶ø´Ï´Ù

Âü°¡ºñ

¡¤  ISACA ȸ¿ø : ¹«·á

¡¤  ºñȸ¿ø : 10,000 ¿ø

¹®ÀÇó

¡¤  ÀüÈ­ : 02-2026-3820

¡¤  À̸ÞÀÏ : isacak@isaca.or.kr