Delivery MethodIn person
About This Course
As the regulatory landscape continues to evolve at a steady clip, IT policies and procedures must evolve right along with it in order to maintain compliance. Enter security policy and regulation. This course explores the significant domestic and international regulatory demands that IT teams everywhere must face. Students will pay special attention to the effects of these regulations on IT infrastructure policy, technology management, and decision making.
By learning through the lens of case studies and regulatory documents, students will explore IT governance, risk and compliance management frameworks, best practices used to meet today’s regulatory challenges, as well as IT policies, procedures, and processes in highly regulated business sectors. Bottom line: Students are introduced to regulations and the common approaches for meeting them in today’s IT operations environments.
Sample course topics: SOX, HIPAA, and GLBA; data classification, compliance strategies, and auditing; policy presentations, IT policy, and procedures frameworks; and physical security policies.
BS, business administration, University of Wisconsin-River Falls
John Raabe currently leads the internal IT audit function at a major health care provider. Previously, he led IT systems administration staff, and he has designed and supported enterprise-class networks and systems. As a certified information systems auditor (CISA), he is particularly interested in IT controls, risk management, compliance, and network design and enterprise IT management issues. He also consults privately on system administration and network management.
- INET 4002 Foundations of Networking
- INET 4153 Introduction to Security: Policy and Regulation