Prerequisites
No technical prerequisites. Executive management commitment recommended. Existing IT process documentation available for analysis.
Target Audience
- →Growing companies structuring their security
- →Organizations preparing for certification (ISO 27001, SOC 2)
- →Groups consolidating multi-entity security governance
- →CIOs and CISOs revamping their security policies
- →Post-incident companies looking to strengthen their framework
Expected Outcomes
Definition of a security governance framework aligned with your strategy
Creation or update of security policies and standards
Implementation of risk management processes
Definition of security roles, responsibilities, and committees
Dashboards and KPIs for security management
Companies in Shanghai using this training
- SAIC Motor - Awareness training for 500+ employees
- China Eastern Airlines - Ongoing certification program
- ICBC - Security audit and custom training
- Zhangjiang Hi-Tech Park startups - Monthly group training sessions
Regulatory Compliance
MLPS (Multi-Level Protection Scheme), Cybersecurity Law of China, PIPL (Personal Information Protection Law), growing ISO 27001 adoption
FAQs
What is information security governance?
What is the difference between governance and security compliance?
How long does it take to implement security governance?
What frameworks do you use for governance?
Ready to get started?
Next session in Shanghai
January 7, 2026
Pricing adapted to the Shanghai market. Inter-company and in-house training available. Custom quote within 24h.