KISAC Mail topM_Gline Contact us topM_Gline
 
Àλ縻 ȸ»çºñÀü ȸ»ç¿¬Çõ Á¶Á÷±¸¼º ã¾Æ¿À½Ã´Â ±æ
°øÁö»çÇ× ÀÚ·á½Ç ä¿ëÁ¤º¸ °¨¸® ¹× IT¼Ò½Ä
°¨¸®ºñ»êÁ¤ »ó´ã¿äû FAQ
°³ÀÎÁ¤º¸¿µÇâÆò°¡ ISMS-P Ãë¾àÁ¡ºÐ¼®Æò°¡ SW º¸¾È ¾àÁ¡ Áø´Ü
Åë½Å°¨¸® Smart-City
(U-CITY)±¸Ãà°¨¸®
Áö´ÉÇü ±³Åëü°è °¨¸® »ç¹°Áö´É Åë½Å°¨¸® VEÄÁ¼³ÆÃ
PMO BPR/ISP ÄÁ¼³Æà µ¥ÀÌÅÍ »ç¾÷
°³¹ß°¨¸® ¿î¿µ°¨¸® BPR/ISP °¨¸® ERP ±¸Ãà °¨¸® GIS ±¸Ãà °¨¸® DB ±¸Ãà°¨¸®
°øÁö»çÇ×
°øÁö»çÇ×
ÀÚ·á½Ç
ä¿ëÁ¤º¸
°¨¸® ¹× IT¼Ò½Ä




°³ÀÎÁ¤º¸Æò°¡ÁöÁ¤
°í°´¼¾ÅÍ
HOME > °øÁö»çÇ× > ÀÚ·á½Ç
Çѱ¹Á¤º¸½Ã½ºÅÛ°¨»çÅëÁ¦ÇùȸÀÔ´Ï´Ù.(ISACA Áö½Ä ÆÄ¿öƯ°­ Á¢¼ö ¾È³») 3456

¡°¾È³çÇϼ¼¿ä, (»ç)Çѱ¹Á¤º¸½Ã½ºÅÛ°¨»çÅëÁ¦ÇùȸÀÔ´Ï´Ù.

2009³â 3¿ù 30ÀÏ ISACA Áö½Ä ÆÄ¿öƯ°­ Âü°¡½ÅûÀÌ Á¢¼öµÇ¾ú½À´Ï´Ù.

¼¼¹Ì³ª ¹ßÇ¥ÀڷḦ ÇöÀå¿¡¼­ ³ª´²µå¸®Áö ¾Ê½À´Ï´Ù.
÷ºÎÇص帮´Â ¹ßÇ¥ÀڷḦ ´Ù¿î·Îµå/Ãâ·ÂÇϼż­ Á÷Á¢ °¡Á®¿À¼Å¾ß ÇÕ´Ï´Ù.

¼¼¹Ì³ª ÀÏÁ¤Àº ´ÙÀ½°ú °°½À´Ï´Ù.

1. ÀϽà : 2009³â 3¿ù 30(¿ù) 19:00 ~ 21:30

2. Àå¼Ò : µ¿ºÎ »ï¼ºµ¿ºôµù ÁöÇÏ1Ãþ Áö±¸°ü(2È£¼± »ï¼º¿ª 5¹ø Ãⱸ/¾àµµÃ·ºÎ)

3. ÀÏÁ¤


¼ø¼­
½Ã°£
³»¿ë
¹ßÇ¥ÀÚ

7:00 ~ 7:20
Âü¼® µî·Ï°ú ȸ¿ø ±³·ù
Âü¿©ÀÚ Àü¿ø

7:20 ~ 7:30
ISACAÁö½Ä°ú ÆÄ¿öƯ°­ ¼Ò°³
±è¿µÈÆ
(¿¬±¸È¸ ÀÌ»ç)

7:30 ~ 8:15
ISACA Asia Pacific CACS
(English presentation):
Information Security Governance and the ISACA  Systemic Security Model
Kyeong Hee Oh
(ISACA Security
Management Committee)

8:15 ~ 8:25
ÈÞ½Ä
Âü¿©ÀÚ Àü¿ø

8:25 ~ 9:00
ISACA½Ç¹«Áö½Ä-IT°Å¹ö³Í½º:
Board Briefing on IT Governance
ÀåÁö¿µ
(ÇùȸGRAÇù·Â°£»ç)

9:00 ~ 9:30
Æ÷·³: IT°Å¹ö³Í½ºÀÇ ÇöÁÖ¼Ò¿¡ ´ëÇÑ Áø´Ü
ÁøÇà: ±è¿µÈÆ ÀÌ»ç
        ¿À°æÈñ Àü¹®À§¿ø
        ÀåÁö¿µ °£»ç
        Á¶ÈñÁØ °£»ç





                  

µî·ÏÇϽŠȸ¿ø, ºñȸ¿ø  °øÈ÷ ¼¼¹Ì³ª ºÒÂü(´ë¸®Âü¼®Àº Âü¼®À¸·Î °£ÁÖ) ½Ã
´ÙÀ½ ¼¼¹Ì³ª Âü¼®±âȸ°¡ Á¦ÇѵǿÀ´Ï ÀÌÁ¡ ¾çÇØÇØÁÖ½Ã°í ²À Âü¼®Çϼż­ À¯ÀÍÇÑ ½Ã°£ÀÌ µÇ½Ã±â¸¦ ±â´ëÇÏ°Ú½À´Ï´Ù.

¾ÕÀ¸·Îµµ ¸¹Àº °ü½É°ú ¼º¿øÀ» ºÎŹµå¸®¸ç, ¼¼¹Ì³ª ÈÄ ¼¼¹Ì³ª ¿î¿µ »óÀÇ °³¼±»çÇ׿¡ ´ëÇؼ­
»ç¹«±¹À¸·Î À̸ÞÀÏ ÁÖ½Ã¸é ¹Ý¿µÅä·Ï ÇÏ°Ú½À´Ï´Ù.

          ISACA Áö½ÄÆÄ¿öƯ°­ ÀÏÁ¤

ȸÂ÷
¿ùº°1Â÷ ÀÏÁ¤

(¿©Àǵµ)
¿ùº°2Â÷ ÀÏÁ¤

(°­³²)
Ư°­ ³»¿ë

1
3¿ù 16ÀÏ(¿ù)
3¿ù 30ÀÏ(¿ù)
Board Briefing on IT governance

2
4¿ù 13ÀÏ(¿ù)
4¿ù 27ÀÏ(¿ù)
CobiT 4.1

3
5¿ù 11ÀÏ(¿ù)
5¿ù 25ÀÏ(¿ù)
COBIT Control Practices

4
6¿ù 15ÀÏ(¿ù)
6¿ù 29ÀÏ(¿ù)
Aligning COBIT¢ç 4.1, ITIL¢ç V3 and ISO/IEC 27002

5
7¿ù 13ÀÏ(¿ù)
7¿ù 27ÀÏ(¿ù)
Information Security Governance

6
8¿ù 10ÀÏ(¿ù)
8¿ù 24ÀÏ(¿ù)
CobiT Security Baseline

7
9¿ù 14ÀÏ(¿ù)
9¿ù 28ÀÏ(¿ù)
Governance of IT Investments(Val IT 2.0)

8
10¿ù 12ÀÏ(¿ù)
10¿ù 26ÀÏ(¿ù)
Case Study

9
11¿ù 9ÀÏ(¿ù)
11¿ù 23ÀÏ(¿ù)
IT Assurance Guide & Framework

10
12¿ù 7ÀÏ(¿ù)
12¿ù 21ÀÏ(¿ù)
IT Governance Implementation Guide



°¨»çÇÕ´Ï´Ù.

========================================
Won, Mi Ok
Tel : +82.2.2026.3820
Fax : +82.2.2026.3818
E-mail : isacak@isaca.or.kr
web site : www.isaca.or.kr
Information Systems Audit & Control Association
Korea Chapter¡°

2009-03-30 Å°»è

µî·ÏµÈ ÆÄÀÏÀÌ ¾ø½À´Ï´Ù.

ÀÌÀü º¸¾È´º½º ±â°í [CISM ƯÁý] ¨êCISM-Á¤º¸º¸¾È ÇÁ·Î±×·¥ °³¹ß
- Çѱ¹Á¤º¸½Ã½ºÅÛ°¨»çÅëÁ¦ÇùȸÀÔ´Ï´Ù.(ISACA Áö½Ä ÆÄ¿öƯ°­ Á¢¼ö ¾È³»)
´ÙÀ½ [CISM ƯÁý] ¨ëCISM-Á¤º¸º¸¾È ÇÁ·Î±×·¥ °ü¸®


ȸ»ç¼Ò°³ °¨¸® Åë½Å/À¶ÇÕ º¸¾È °í°´Áö¿ø KISAC Mail