Prerequisites
No technical prerequisites. Executive management commitment recommended. Existing IT process documentation available for analysis.
Target Audience
- →Growing companies structuring their security
- →Organizations preparing for certification (ISO 27001, SOC 2)
- →Groups consolidating multi-entity security governance
- →CIOs and CISOs revamping their security policies
- →Post-incident companies looking to strengthen their framework
Expected Outcomes
Definition of a security governance framework aligned with your strategy
Creation or update of security policies and standards
Implementation of risk management processes
Definition of security roles, responsibilities, and committees
Dashboards and KPIs for security management
Companies in Miami using this training
- Citrix - Awareness training for 500+ employees
- Magic Leap - Ongoing certification program
- Teradata - Security audit and custom training
- Miami Tech Hub startups - Monthly group training sessions
Regulatory Compliance
SOC 2, PCI DSS, HIPAA (Health Insurance Portability and Accountability Act), CCPA (California Consumer Privacy Act for multi-state companies), NIST Cybersecurity Framework
FAQs
What is information security governance?
What is the difference between governance and security compliance?
How long does it take to implement security governance?
What frameworks do you use for governance?
Ready to get started?
Next session in Miami
January 25, 2026
Pricing adapted to the Miami market. Inter-company and in-house training available. Custom quote within 24h.