Friday, June 17, 2022

IT CYBER RISK SECURITY MANAGEMENT TRAINER

HERY PURNAMA, SE.,MM.

MCP, PMP, CISM, CISSP, CISA, ITILF, CTFL, CDMP

CERTIFIED  IT TRAINER - BANDUNG

 SILABUS TRAINING

 


IT CYBER RISK SECURITY MANAGEMENT


DURATIONS :  3 DAYS (OFF/ONLINE TRAINING   09.00   –  16.00  )


DESCRIPTION : In this course you will gain a solid understanding of risk management principles, processes, frameworks and techniques that can be applied specifically to cyber security as well as risk in general.


You will learn how to identify, assess and articulate risk as well as options available for treating cyber security risk and which may be most appropriate for your situation.


This course also provides examples of tools and techniques as well as useful tips that can help you to successfully implement and maintain a risk management framework within your organization

TRAINING OBJECTIVES : Develop an understanding of what risk is and how it can be managed.

How to create a risk management framework within your organisation.

How to identify, assess and articulate risk as well as identifying options for treatment and determining which is the most appropriate.

How to perform detailed analysis of risk and develop risk treatment plans.

How to apply risk management concepts in practice including developing a risk register, Cyber Security Strategy Plan, governance models, risk bowties and reporting.

REQUIREMENTS : No special requirements

PARTICIPANTS : - Information Technology Managers

- Information/Cyber Security Managers

- Information Security Professionals

- Anyone with an interest in gaining a general understanding of risk management as well as how it applies to information security

TRAINING TOPICS : Introduction

What Is Risk?

IT & Cyber Security Risk

Components of a Risk

Articulating Risk



Risk Management

What is Risk Management

Objectives of Risk Management

Risk Management vs Risk Minimisation

Risk Management Principles

Risk Management Framework

Mandate & Commitment

Designing your framework

Designing your framework – Organisational Context

Designing your framework - Establish Policy

Designing your framework - Accountability

Designing your framework - Organisational Integration

Designing your framework - Communication & Reporting

Designing your framework - Implementation

Designing your framework - Monitoring & Review

Designing your framework - Continual Improvement

The risk management process

The risk management process - Communication & Consultation

The risk management process - Context Establishment

The risk management process - Risk Assessment

The risk management process - Risk Treatment

The risk management process - Monitoring & Review

The risk management process - Auditability and Traceability

Risk Management - Maturity Models


Risk Management - Risk Assessment & Measurement

Risk Assessment & Measurement - Terminology

The risk management process (recap)

Risk Identification

Risk Analysys

Risk Analysis - Likelihood

Risk Analysis - Consequence/Impact

Risk Analysis - Consequence Examples

Risk Analysis - Risk Matrix

Risk Analysis - Analysis Example 

Risk Evaluation

Risk Treatment

Risk Treatment Plan Example 

Risk Treatment Considerations


Cyber Security Risk management in Practice

Creating an IT risk register

Example Excel risk register

Risk governance -   lines of defence model

Developing Cyber Security Strategy Plan 

Risk bowties

 



Next Recommendation  Training : 1. CISM Exam Preparation Training

2. CISSP Exam Preparation Training

3. ISO 27001 Training

4. ISO 31000 Training



0 comments:

Post a Comment

Terima kasih telah mengunjungi halaman website kami, Jika ada pertanyaan terkait informasi di Atas silahkan isi Comment Box di bawah ini, Tim kami akan merespon komentar/ pertanyaan Anda paling lambat 2 x 24 Jam

Untuk respon cepat silahkan hubungi 0838-0838-0001 (Call/Whatsapp)

Regards,

Management,
www.purnamaacademy.com

Top Topics

JadwalKegiatan.com