Shop

Best Seller
London, Europe, USA East Coast Time Zones
CPEs: 24
Instructor: Sue Milton
Level: Intermediate
Tuition: £1,995.00
Register Now

NEW Implementing Solutions to Mitigate Cybersecurity Risk SDIT023

Location: London, Europe, USA East Coast Time Zones

First Date: Jun 16 - 18 2021

Duration: 3 days/ 24 hours

Programme Director: Sue Milton

All Dates & Locations
Venue Details

Experience the highly-interactive expert-led social learning through Virtual Classroom via Cisco WebEx from Risk Reward.

All our 2021 Virtual Classroom events feature shared (or discrete) live chat between delegates and the expert, participate in topical surveys, polling questions, group exercises and case studies for a tried -and- true engaging and gratifying learning experience.

Agenda Highlights

 Session 1:  The New Nature of Cybersecurity

Session 2:  Cybersecurity Standards

Session 3:  Recent cases – Case Study Session

Session 4:  Information Security

 Session 5:  Threat Analysis

Session 6:  The Impact of Changing Work Patterns on Cybersecurity

Session 7:  Cyber Risk Assessment

Session 8:  The Cybersecurity Program

Session 9:  Investigating Cybersecurity Incidents

Session 10:  The Future of Cybersecurity

Overview

Cyber risks and incidents are on the increase and all firms need to act to ensure that they have implemented robust cybersecurity systems and protocols to ensure operation resilience.

Delegates will explore the range of emerging rules and standards, highlighting the actions that are needed to provide assurance to your organisation’s stakeholders.

Focussing on practical solutions to technical problems, the course provides practical guidance on the implementation of an effective cyber risk mitigation framework, its key constituents and the actions that are required.  In particular the important roles of data mining and the implementation of forward- looking risk identifiers.

Who Should Attend

Designed primarily for risk management and internal control management and personnel yet recent delegates include those from IT, operations, internal audit, compliance and HR.

Additional Course Information

What Does It Cover?

Session 1:   What is Cybersecurity?

  •  How is it defined?
  • What are the key issues?
  • The current guidance
  • Historic threats and cases
  • The purpose of a cyber security program
  • Tools and techniques

Case Study:  What are the key lessons from historic incidents? 

Session 2:  Cybersecurity Standards

  •  PAS 555
  • Minimum cybersecurity standards
  • ISO/IEC 27001:2013
  • ISO/IEC 27032
  • NIST CSF
  • BIS and cybersecurity
  • FFEIC cybersecurity assessment tool
  • EU and cybersecurity

 Case Study:  Which are the rules that matter most to you?  What actions should be taken?

 Session 3:  Recent cases – Case Study Session

 In this session we will look at a series of the most recent cases of cyberbreaches that have been identified.  What could have been done to have prevented the loss?

 Session 4:  Information Security

  •  What is key data?
  • How is this impacted by cybersecurity?
  • Data requiring protection
  • Information security program
  • Security policies, standards and guidelines
  • Impact of cybersecurity on information security

Case Study:  Identification of critical information

 Session 5:  Threat Analysis

  •  Current cybersecurity threats
  • Heightened risk – Joint guidance
  • Risks of Denial of Service (DDoS) – FDIC guidance
  • Security risks of VOIP  – FDIC guidance
  • Pharming attacks and phishing
  • Keeping ahead of the malicious agents
  • Wireless technology risks
  • Risks in the cloud
  • Vulnerability assessment
  • Collection of data
  • Risk appetite, risk acceptance and cybersecurity
  • Mitigation and anticipation

Case Study:  Which are the risks that most concern your Board?  How are these reported?

Session 6:  The Impact of Changing Work Patterns on Cybersecurity

  •  How are work patterns changing as a consequence of the crisis?
  • Are these changes likely to be permanent?
  • What does this mean for cybersecurity?
  • How does this change the risk assessment?
  • Impact on data security
  • Impact on business continuity planning
  • Impact on productivity

 Case Study:  What are the actions that are needed to reduce cyber risk due to remote working?

 Session 7:  Cyber Risk Assessment

  • The assessment process
  • Threat metrics
  • Threat models
  • Threat matrix
  • Denial of service attacks (DOS)
  • Attack vendors
  • Attack trees

Case Study:  Populate a cyber risk assessment

Session 8:  The Cybersecurity Program

  • The key elements
    • Framework
    • Charter
    • Policies
    • Process
    • Measurement
  • Corporate governance
  • Identity and access management
  • The 3 lines model and cybersecurity
  • Due care considerations
  • Due diligence
  • Developing forward looking identifiers
  • Benchmarking
  • Incident management plan
  • Enterprise security architecture
  • Ethical hacking
  • Data mining and modelling

 Case Study:  Creating forward looking identifiers – what matters?

 Session 9:  Investigating Cybersecurity Incidents

  •  Regulatory guidance
  • Actions to be taken
  • Governance and management
  • Identifying information
  • Tracking activity
  • Efficient approaches
  • Data mining
  • Reporting and tracking

 Case Study:  Investigating an incident

Learning Objectives

Delegates will gain specialist technical knowledge,  techniques and skills, experience ‘on-the-job-style’ training in group discussion and working hands-on through case studies and exercises to apply learned concepts in order to

  • Appreciate the current threats
  • Understand the nature of current guidance
  • See the actions being taken by regulators
  • Consider the contents of the cyber deterrence framework
  • Review recent and historic cases and see lessons to be learnt
  • Create forward looking identifiers
  • Manage incidents effectively
Social Learning & Methods

Highly interactive expert-led intensive presentation, Q&A, group real-time in-depth case studies, regulation and discussion supported by key principles and theory. The virtual learning platform uses safe, industry preferred encrypted Cisco WebEx to optimize live face-to-face visual interaction, discrete chat, for polling and quizzes. (An invitation via email with access link is included for all participants.)

Registration

Sale

NEW Implementing Solutions to Mitigate Cybersecurity Risk

Course Fee

Early Bird Discounts of 10% available by May 1, 2021

Course Fee (per person):
GBP £1,995.00 (+ UK VAT when applicable)

Number of delegates:

Data Privacy & Update of Contact Details Risk Reward Limited is fully compliant with the Data Protection Act. The information you provide will be safeguarded by Risk Reward Ltd. We do not rent, sell or exchange your details to anyone without your consent. Your details are never given to third parties. If you wish to update your details, please email: info@riskrewardlimited.com with your OLD and NEW details. Please allow 10 days to see the changes take effect. Thank you.

Terms and Conditions: You can cancel at any time.Due to the on-going COVID 19 environment cancellations may be made at any time for either a full refund or a credit towards another event occurring within the following 6 month period. Simply email or telephone the London Client Services team at training@riskrewardlimited.com to advise your preference and we will do our best to accommodate your circumstances. Risk Reward Ltd receives the right to a final decision in the event of a dispute.

All Risk Reward public courses are guaranteed to run although those offered by affiliates are subject to demand

Quick Contact

    Get in touch and see how Risk Reward can help you

    Our London team are ready to answer questions, provide information & choices to help make your public seminar booking in a prompt, professional & friendly manner.

    Get in touch and see how Risk Reward can help you

    Our London team is ready to listen carefully to your needs, take the brief, explore options, offer suggestions and help you in a professional and friendly manner.