Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.
The programme has been specifically designed to provide you with a highly practical guide to the key skills; strategies and techniques that you will need in the handling of IT security issues.
This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal and external clients encompassing a complete, conjoined set of disciplines in the areas of IT policies, Security-Operational-Run-Book,
security/penetration testing, ethical hacking and black hat hacking. It will also cover WiFi security, Website security, human factors, cyber forensics, cyber security team management, Secure Operations Center (SOC) and Computer Security Incident Response Team (CSIRT)
infrastructures As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities.
Participants will also respond to an example security incident and identify the best practices which could be applied to secure their own organization, and associated assets. All participants will be given copies of Run Books to deal with cyber extortions, Distributed Denial of Service (DDoS/DoS) and forensic investigations.
By attending this ICL training course, delegates will learn about:
Cyber Security Risk Defined
How to Manage Cyber Risk
Building a Cyber Security Strategy
Implementing a Cyber Security Strategy
Aligning with Regulatory Requirements
Managing Change Related to Cyber Security
Cyber People – The Right People and Structure
Cyber Metrics – Measuring Your Cyber Risk
Cyber Intelligence
It’s happened – Your hacked – What to Do!
Cyber and the Boardroom – How to Interact
Live-Online
IT Professionals
Security Professionals
Senior managers who are responsible for managing risk and/or embedding effective systems of corporate governance.
ICT Managers/Officers
Chief executives and heads of departments who require a better understanding of cyber risk management and the role it should play within their organizations.
Risk Professionals
Insurance managers,
Brokers,
Safety practitioners,
Auditors,
Project managers,
Accountants,
Solicitors and
Consultants who are increasingly finding cyber risk management is forming part of their remit or are expected to have an understanding of the subject.
Topics
Introduction to Risk Assessment and Management
Ensuring compliance with applicable regulatory drivers
Protecting the organization from unacceptable losses
Describing the Risk Management Framework
Applying risk management processes
Practical exercise
Characterizing System Security Requirements
Defining the system
Outlining the system security boundary
Pinpointing system interconnections
Practical exercise
Incorporating the unique characteristics of Industrial Control Systems (ICS) and cloud-based systems
Identifying security risk components
Practical exercise
Estimating the impact of compromises to confidentiality, integrity and availability
Adopting the appropriate model for categorizing system risk
Setting the stage for successful risk management
Documenting critical risk assessment and management decisions in the System Security Plan (SSP)
Appointing qualified individuals to risk governance roles
Selecting Appropriate Security Controls
Assigning a security control baseline
Investigating security control families
Determining the baseline from system security risk
Tailoring the baseline to fit the system
Examining the structure of security controls, enhancements and parameters
Binding control overlays to the selected baseline
Gauging the need for enhanced assurance
Distinguishing system-specific, compensating and non-applicable controls
Reducing Risk Through Effective Control Implementation
Specifying the implementation approach
Maximizing security effectiveness by "building in" security
Reducing residual risk in legacy systems via "bolt-on" security elements
Applying NIST/ISO controls
Enhancing system robustness through selection of evaluated and validated components
Coordinating implementation approaches to administrative, operational and technical controls
Providing evidence of compliance through supporting artifacts
Assessing Compliance Scope and Depth
Developing an assessment plan
Prioritizing depth of control assessment
Optimizing validation through sequencing and consolidation
Verifying compliance through tests, interviews and examinations
Formulating an authorization recommendation
Evaluating overall system security risk
Mitigating residual risks
Practical exercise
Publishing the Plan of Action and Milestones (POA&M), the risk assessment and recommendation
Authorizing System Operation
Aligning authority and responsibility
Quantifying organizational risk tolerance
Elevating authorization decisions in high-risk scenarios
Forming a risk-based decision
Appraising system operational impact
Weighing residual risk against operational utility
Issuing Authority to Operate (ATO)
Maintaining Continued Compliance
Justifying continuous reauthorization
Measuring impact of changes on system security posture
Executing effective configuration management
Performing periodic control reassessment
Preserving an acceptable security posture
Delivering initial and routine follow-up security awareness training
Collecting on-going security metrics
Practical exercise
Implementing vulnerability management, incident response and business continuity processes