trainfo.jpg

Duration: 2 days

Training type: classroom or online

Language: English

Price: 20000€

General information:

Despite the ongoing cyber threat that is witnessed through news reports almost on a daily basis, firms are still neglecting proper cybersecurity planning. As information technology becomes ever more complex and Internet of Things applications progressively widespread, cybersecurity is becoming an increasingly important and business-critical field. Unfortunately, a recent study from security solutions provider Resilient Systems and market research firm Ponemon broke down key areas of continued failure for organizations.

The study found that 66% of IT and security professionals surveyed said their firms were unprepared to recover from a cyber attack, and 75% lacked a formal incident response plan. A key example of this unpreparedness is that fact that many of the companies impacted by the WannaCry ransomware attack had not installed patches in their Windows infrastructure that were released by Microsoft months before. Vulnerabilities in commercial software are common; the only solution is to stay abreast of manufacturer’s releases.

In order to help businesses in their cybersecurity planning, the Cybersecurity Framework released in February 2014 following a collaborative process involving industry, academia and government has been widely adopted by many types of organizations around the world, quickly becoming the de facto standard by which cyber security is going to be measured.

The Executive Cybersecurity Workshop will bring leaders up to speed on the most recent and battle-tested approaches to protect their companies’ valuable information and intellectual property from prying eyes of hackers and competitors. Attendees to the program will learn how to apply the Cybersecurity Framework in their organizations and erect strong defences for their valuable customer and employee data and intellectual property.

 

ATTENDEES TO THE PROGRAM WILL:

   Gain a comprehensive understanding of cybersecurity and its key aspects

    Get to grips with various cybersecurity testing methods

    Master the cybersecurity framework and its five core functions

    Discover how to establish or improve your cybersecurity program

    Gain an overview of cyber network defense

    Transform the “weak human link” into the organization’s greatest strength

    Look at the four components of the cyber preparedness continuum

 

ORGANIZATIONS THAT WILL BENEFIT:

All Forward Thinking Companies

Insurance Companies

Banks & Financial Services

Retail Companies

Manufacturing Companies

Internet Security Services

Government & Regulators

Vendors

 

EXECUTIVES EXPECTED IN ATTENDANCE:

C-Suite Executives: CEOs, CIOs, CTOs, CCOs, CFOs, COOs

CISOs

Board Members

Chief Data Officers

Chief Risk Officers

Security Engineers

Security Architects

Security Administrators

Corporate Strategists

Investment Managers

IT Managers

Private Equity Executives

Research Managers

Security Analysts

Data Security & Protection

Software Developers

 

AGENDA (2-DAY PROGRAM):

DAY 1: UNDERSTANDING THE LOOMING THREAT

 

- SESSION 1: CYBERSECURITY OVERVIEW AND TRENDS

    Understanding today’s cyber attacks

    How to get better at responding to cyber threats

    Combating today’s attacks with 21st century tools

- SESSION 2: UNDERSTANDING THE CYBERSECURITY TESTING METHOD

    Anatomy of a cyberattack explained

    Cybersecurity testing as a component of a strong governance process

    Protection of firm networks and client information

    Detection of unauthorized activity and other security vulnerabilities

- SESSION 3: TO PHISH OR NOT TO PHISH

    Spear phishing, ransomware and watering hole illustrated

    Spotting tell-tale signs of phishing

    Interplay between user awareness and IT

 

DAY 2: PREPARING AND DEPLOYING A SUCCESSFUL STRATEGY

 

- SESSION 1: INTRODUCTION TO THE CYBERSECURITY FRAMEWORK

    Why a Cybersecurity Framework is urgently needed

    Using the Cybersecurity Framework to strengthen information security

    The Cybersecurity Framework from conceptualization to implementation

- SESSION 2: THE CYBERSECURITY FRAMEWORK COMPONENTS

    Core of cybersecurity activities and references common across critical sectors

    Aligning standards, guidelines and practices with current vs. target profiles

    How the organization views cyber threats through the implementation tiers

- SESSION 3: SOCIAL ENGINEERING: HOW THE “WEAK HUMAN LINK” CAN BECOME THE ORGANIZATION’S GREATEST STRENGTH

    Social Engineering and Cognitive Biases

    How Information Security is Affected by Behavior Economics

    Today’s Systems Development Environment

banbo.jpg