Agenda

Agenda

Cybersecurity Risk and Resilience

Course agenda

**************************************************
Live virtual course | Below agenda timing is in BST.

Respective time in EDT:

Start: 2pm BST | 9am EDT
Break: 3pm BST | 10am EDT
End: 4.15pm BST | 11.15am EDT

**************************************************

14:0015:00

Overview of cybersecurity risk and cyber resilience

14:00 - 16:15

  • Introduction to cyber security and cyber risk

  • Introduction to cyber resilience methods

  • Identifying & evaluating cyber risks

  • Cybersecurity and emerging technologies

15:0015:15

Break

15:00 - 15:15

15:1516:15

Overview of main cybersecurity frameworks

15:15 - 16:15

  • Augmenting cybersecurity portfolios with new frameworks

  • ISO 27001 – guidelines, standards, and best practices

  • NIST – guidelines, standards, and best practices

  • How to educate and integrate into other departments

14:0015:00

Elaborating an IT Risk Management Framework

15:15 - 16:15

  • Foundations of an IT risk management framework

  • Identifying and evaluating IT risks

  • Treatment and monitoring of IT risks 

  • How do IT risks fit in the context of the business activities

15:0015:15

Break

15:00 - 15:15

15:1516:15

How to create cyber governance in your organisation

14:00 - 15:00

  • Information security governance best practices and standards

  • The role of CISOs within organizations

  • How to present to your C-Suite and board

  • How to involve them in cyber incident response

14:0015:00

Cybercrime – lessons to be learned

14:00 - 15:00

  • Notable attacks – case studies

  • Creating a compliant culture

  • The role technology plays

15:0015:15

Break

15:00 - 15:15

15:1516:15

Creating an efficient and usable cybersecurity programme

15:15 - 16:15

  • Best place to start

  • Instilling security of culture and building cyber into core management processes

  • Creating a system that maintains daily usability

  • Dealing with the increasing price of cyber security

  • Potential for automation

14:0015:00

REX: Gaps in cybersecurity programmes

14:00 - 15:00

  • Incomplete enterprise security programs

  • Lack of asset & resources inventories

  • Lack of effective controls and system monitoring 

  • Lack of alignment with other frameworks & activities

15:0015:15

Break

15:00 - 15:15

15:1516:15

Third-party cyber risks

15:15 - 16:15

  • Overview of third-party cyber risks

  • Contractual aspects & SLAs

  • Third-party cyber risk assessments

  • Improving cyber risk collaboration with vendors

View agenda in pdf format

Please fill in your details