Á¤º¸¾È³»°øÁö»çÇ×
Á¦21ȸ ISACA Áö½Ä ÆÄ¿öƯ°­ ¾È³» 
 

Á¦21ȸ ISACA Áö½Ä ÆÄ¿öƯ°­ ¾È³»

(8¿ù 2¹ø° ¿ÀÇÁ¶óÀÎ ¼¼¹Ì³ª)

 

¾È³çÇϼ¼¿ä?

 

ISACA KoreaÀÇ Á¦ 2±â ÆÄ¿ö Ư°­ÀÌ 3¿ùºÎÅÍ ÁøÇà ÁßÀÔ´Ï´Ù. À̹ø Ư°­Àº 8¿ù 2¹ø° ¿ÀÇÁ¶óÀΠƯ°­ÀÔ´Ï´Ù.  ISACA¿¡¼­´Â 2009³â 3¿ùºÎÅÍ ¿©Àǵµ¿Í °­³²À» Áß½ÉÀ¸·Î ¿ù 2ȸ Ư°­À¸·Î È®´ëÇÏ¿© ½Ç½ÃÇÕ´Ï´Ù. µû¶ó¼­ ÆÄ¿öƯ°­¿¡ Âü¿©ÇÏ°íÀÚ ÇÏ´Â ºÐµéÀº ¿ù Áß Æí¸®ÇÑ ½Ã°£¿¡ Âü¿©ÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù. ÀÌ´Â ISACA½Ç¹«Áö½ÄÀÇ °¡Ä¡¸¦ ±¸ÇöÇÏ°í º¸±ÞÇÏ´Â µ¥ ¾ÕÀå¼­°íÀÚ, º¸´Ù ¸¹Àº ºÐµé¿¡°Ô Áö½Ä °øÀ¯ÀÇ ±âȸ¸¦ Á¦°øÇÏ·Á´Â ISACA ¸ñÇ¥¸¦ ½ÇÇöÇϱâ À§ÇÔÀÔ´Ï´Ù.

 

1.     ISACA Áö½ÄÀ» °¡Áö°í ÀÚÀ¯·Ó°Ô Åä·ÐÇÏ°í »õ·Ó°Ô ½ÃÀÛÇÒ Á¦ 2±â ÆÄ¿öƯ°­¿¡ ´ëÇؼ­ ¾È³»ÇØ µå¸®°Ú½À´Ï´Ù.

2.  À̹ø Ư°­ ½Ã°£¿¡´Â ¿©Àǵµ Ư°­¿¡ À̾ ¡°CoBiT Security Baseline¡±ÀÇ ³»¿ëÀ» ÀÌÇØÇÏ´Â ½Ã°£À» °¡Áöµµ·Ï ÇÏ°Ú½À´Ï´Ù. Security Issue¿¡ ´ëÇÑ Cobit-Based Key Control¿¡ ´ëÇØ ÁÁÀº ½Ã»çÁ¡À» ¾òÀ¸½Ã±æ ¹Ù¶ø´Ï´Ù.

3.   3¿ùºÎÅÍ »õ·Ó°Ô ¾Æ·¡ ISACA±âº»¼­ 15±ÇÀ» °¡Áö°í 10ȸ¿¡ °ÉÃÄ ÆÄ¿öƯ°­ÀÌ ÁøÇàµÇ°í
ÀÖ½À´Ï´Ù. ÀÌ ±âº»¼­µéÀº www.isaca.org¿¡¼­ PDFÆÄÀÏÀ» ¹«·á·Î ³»·Á ¹ÞÀ» ¼ö ÀÖ½À´Ï´Ù. ¿©·¯ºÐµµ ÇÔ²² ¸Å´Þ ÆÄ¿öƯ°­ Áøµµ¿¡ ¸ÂÃç °øºÎÇØ ³ª°¡½Ã±â ¹Ù¶ø´Ï´Ù.

 

-ISACA±âº»¼­ 15±Ç ¸ñ·Ï-

* ÆÄ¿öƯ°­ (15±Ç)   ¢Ñ ´Ù¿î·Îµå ÆäÀÌÁö º¸±â Ŭ¸¯

1. Board Briefing on IT Governance, 2nd Edition

2. CobiT 4.1 

3. COBIT Control Practices: Guidance to Achieve Control Objective for Successful IT Governance,

2nd Edition 

4.0 Aligning COBIT?? 4.1, ITIL?? V3 and ISO/IEC 27002 for Business Benefit

5.0 Information Security Governance: Guidance for Information Security Managers

5.1 Information Security Governance Guidance for Boards of Directors and Executive Management

2nd Edition 

6. CobiT Security Baseline: An Information Security Survival Kit

7.0 Enterprise Value: Governance of IT Investments, The Val IT Framework 2.0

7.1 Enterprise Value: Governance of IT Investments, Getting Started with Value Management

8.0 IT Governance using CobiT and Val IT TIBO Case Study

8.1 Val IT Case Study: Value Governance - police case study

8.2 Enterprise Value: Governance of IT Investments,The ING Case Study

9.0 IT Assurance Guide: Using COBIT

9.1 ITAF: A Professional Practices Framework for IT Assurance

10. IT Governance Implementation Guide: Using COBIT and Val IT, 2nd Edition

 

¾Æ¹«ÂÉ·Ï ½Ç¹«¿¡¼­ ÀÏÇÏ´Â ¿ì¸® ȸ¿ø ¿©·¯ºÐ¿¡°Ô º» Ư°­ÀÌ ¿©·¯¸ð·Î È°¿ëµÉ ¼ö Àֱ⠹ٶø´Ï´Ù.

 

°¨»çÇÕ´Ï´Ù.

2009. 8. 18.

ISACA Korea   

 

 

ÀÏ ½Ã

2009³â 8¿ù 24ÀÏ (¿ù) Àú³á 7:00 ~ 8:45

Àå ¼Ò

µ¿ºÎ »ï¼ºµ¿ ºôµù ÁöÇÏ 1Ãþ Áö±¸°ü (2È£¼± »ï¼º ¿ª 5¹ø Ãⱸ) ¢Ñ ¾àµµº¸±â

¼ø ¼­

½Ã°£

³»¿ë

¹ßÇ¥ÀÚ

7:00 ~ 7:30

Âü¼® µî·Ï

Âü¿©ÀÚ Àü¿ø

7:30 ~ 7:45

ISACA Áö½Ä°ú ÆÄ¿öƯ°­ ¼Ò°³

±è¼±¹è

(ISACA Çùȸ °£»ç)

7:45 ~ 8:45

ISACA IT°Å¹ö³Í½º Áö½Ä: ¡°CoBiT Security Baseline¡±
¢Ñ¹ßÇ¥ÀÚ·á ´Ù¿î·Îµå

±è¹ÎÁ¤
(ISACA
Çùȸ °£»ç)

CPE

2 ½Ã°£

Âü°¡½Åû

8¿ù µÎ¹ø° Ư°­Àº º°µµÀÇ ½ÅûÀ» ¹ÞÁö ¾Ê½À´Ï´Ù.
Ư°­¿¡ Âü¿©ÇÏ½Ç ºÐµéÀº ¸íÇÔ°ú ȸ¿ø ID¸¦ Áغñ ¹× È®ÀÎ Çϼż­ Ư°­¿¡ Âü¿©ÇÏ½Ã¸é µË´Ï´Ù
.


ȸ¿øÀ̶ó ÇÔÀº ȸ¿øºñ¿ëÀ» ³»½Ã°í °¡ÀÔÇϽŠISACA Global ȸ¿ø, ±¹³» ¹ýÀÎȸ¿ø, ±¹³» °³ÀÎȸ¿øÀ» ÁöĪÇÕ´Ï´Ù.

ȨÆäÀÌÁö ȸ¿ø ¹× »ó±âÇÑ ISACAȸ¿øÀÌ ¾Æ´Ñ ¿¬±¸È¸ ȸ¿øÀº ºñȸ¿øÀ¸·Î °£ÁÖÇÕ´Ï´Ù.

 

*  ¹ßÇ¥ÀڷḦ ÇöÀå¿¡¼­ ³ª´²µå¸®Áö ¾Ê½À´Ï´Ù.

¹ßÇ¥ÀڷḦ ´Ù¿î·Îµå/Ãâ·ÂÇؼ­ Á÷Á¢ °¡Á®¿À½Ã±â ¹Ù¶ø´Ï´Ù
 

Âü°¡ºñ

¡¤  ISACA ȸ¿ø : ¹«·á

¡¤  ºñȸ¿ø : 10,000 ¿ø

¹®ÀÇó

¡¤  ÀüÈ­ : 02-2026-3820

¡¤  À̸ÞÀÏ : isacak@isaca.or.kr