Friday, June 17, 2022

IT CYBER RISK SECURITY MANAGEMENT TRAINER

HERY PURNAMA, SE.,MM.

MCP, PMP, CISM, CISSP, CISA, ITILF, CTFL, CDMP

CERTIFIED  IT TRAINER - BANDUNG

 SILABUS TRAINING

 


IT CYBER RISK SECURITY MANAGEMENT


DURATIONS :  3 DAYS (OFF/ONLINE TRAINING   09.00   –  16.00  )


DESCRIPTION : In this course you will gain a solid understanding of risk management principles, processes, frameworks and techniques that can be applied specifically to cyber security as well as risk in general.


You will learn how to identify, assess and articulate risk as well as options available for treating cyber security risk and which may be most appropriate for your situation.


This course also provides examples of tools and techniques as well as useful tips that can help you to successfully implement and maintain a risk management framework within your organization

TRAINING OBJECTIVES : Develop an understanding of what risk is and how it can be managed.

How to create a risk management framework within your organisation.

How to identify, assess and articulate risk as well as identifying options for treatment and determining which is the most appropriate.

How to perform detailed analysis of risk and develop risk treatment plans.

How to apply risk management concepts in practice including developing a risk register, Cyber Security Strategy Plan, governance models, risk bowties and reporting.

REQUIREMENTS : No special requirements

PARTICIPANTS : - Information Technology Managers

- Information/Cyber Security Managers

- Information Security Professionals

- Anyone with an interest in gaining a general understanding of risk management as well as how it applies to information security

TRAINING TOPICS : Introduction

What Is Risk?

IT & Cyber Security Risk

Components of a Risk

Articulating Risk



Risk Management

What is Risk Management

Objectives of Risk Management

Risk Management vs Risk Minimisation

Risk Management Principles

Risk Management Framework

Mandate & Commitment

Designing your framework

Designing your framework – Organisational Context

Designing your framework - Establish Policy

Designing your framework - Accountability

Designing your framework - Organisational Integration

Designing your framework - Communication & Reporting

Designing your framework - Implementation

Designing your framework - Monitoring & Review

Designing your framework - Continual Improvement

The risk management process

The risk management process - Communication & Consultation

The risk management process - Context Establishment

The risk management process - Risk Assessment

The risk management process - Risk Treatment

The risk management process - Monitoring & Review

The risk management process - Auditability and Traceability

Risk Management - Maturity Models


Risk Management - Risk Assessment & Measurement

Risk Assessment & Measurement - Terminology

The risk management process (recap)

Risk Identification

Risk Analysys

Risk Analysis - Likelihood

Risk Analysis - Consequence/Impact

Risk Analysis - Consequence Examples

Risk Analysis - Risk Matrix

Risk Analysis - Analysis Example 

Risk Evaluation

Risk Treatment

Risk Treatment Plan Example 

Risk Treatment Considerations


Cyber Security Risk management in Practice

Creating an IT risk register

Example Excel risk register

Risk governance -   lines of defence model

Developing Cyber Security Strategy Plan 

Risk bowties

 



Next Recommendation  Training : 1. CISM Exam Preparation Training

2. CISSP Exam Preparation Training

3. ISO 27001 Training

4. ISO 31000 Training



0 comments:

Post a Comment

Terima kasih telah mengunjungi halaman website kami, Jika ada pertanyaan terkait informasi di Atas silahkan isi Comment Box di bawah ini, Tim kami akan merespon komentar/ pertanyaan Anda paling lambat 2 x 24 Jam

Untuk respon cepat silahkan hubungi 0838-0838-0001 (Call/Whatsapp)

Regards,

Management,
www.purnamaacademy.com

IT Management and Certifications

  • TRAINING ITIL V.4 FOUNDATION (IT INFRASTRUCTURE LIBRARY)
  • TRAINING TOGAF (THE OPEN GROUP ARCHITECTURE FRAMEWORK) PART 1 & PART 2
  • TRAINING ARCHIMATE (ENTERPRISE ARCHITECTURE MODELING LANGUAGE)
  • TRAINING PMP/ CAPM (PMBOK - PROJECT MANAGEMENT BODY OF KNOWLEDGE)
  • TRAINING PMO (PROJECT MANAGEMENT OFFICE)
  • TRAINING CTFL - ISTQB (CERTIFIED TESTER FOUNDATION LEVEL - INTERNATIONAL SOFTWARE TESTING QUALIFICATION BOARD)
  • TRAINING SQA (SOFTWARE QUALITY ASSURANCE)
  • TRAINING PRINCE2 (PROJECTS IN CONTROLLED ENVIRONMENTS)
  • TRAINING RDBMS CONCEPT
  • TRAINING DATA MANAGEMENT BODY OF KNOWLEDGE (DMBOK)
  • TRAINING SAD UML (SYSTEM ANALYSIS DESIGN WITH UML 2.0)
  • TRAINING CBAP - BUSINESS ANALYSIS WITH BABOK V.2
  • TRAINING SEO & DIGITAL MARKETING
  • TRAINING E-FILLING WITH EDMS (ELECTRONIC DOCUMENT MANAGEMENT SYSTEM)
  • TRAINING ISO/IEC 27001:2022 (INFORMATION SECURITY MANAGEMENT SYSTEMS - ISMS)
  • TRAINING ISO/IEC 20000-1:2018 (INFORMATION TECHNOLOGY SERVICE MANAGEMENT)
  • TRAINING ISO/IEC 38500:2008 (CORPORATE GOVERNANCE OF INFORMATION TECHNOLOGY)
  • TRAINING ISO/IEC 90003:2014 (SOFTWARE ENGINEERING)
  • TRAINING ISO 31000 : RISK MANAGEMENT
  • TRAINING COSO ENTERPRISE RISK MANAGEMENT
  • TRAINING ISO 28000:2007 (SUPPLY CHAIN SECURITY MANAGEMENT)
  • TRAINING ISO 22301:2019, SECURITY AND RESILIENCE – BUSINESS CONTINUITY MANAGEMENT SYSTEMS
  • TRAINING INDEKS KAMI V.4.2 (INDEKS KEAMANAN INFORMASI) – BSSN
  • TRAINING SIX SIGMA FOUNDATION (GREEN BELT)
  • TRAINING IIOT (INDUSTRIAL 4.0 INTERNET OF THINGS)
  • TRAINING MANAGERIAL SKILLS AND LEADERSHIP
  • TRAINING KMS - KNOWLEDGE MANAGEMENT SYSTEM
  • TRAINING ELMS – ELECTRONIC LEARNING MANAGEMENT SYSTEM
  • TRAINING DEVOPS/ DEVSECOPS
  • TRAINING CISA (CERTIFIED INFORMATION SYSTEMS AUDITOR)
  • TRAINING CCISO (CERTIFIED CHIEF INFORMATION SECURITY OFFICER)
  • TRAINING CISM (CERTIFIED INFORMATION SECURITY MANAGER)
  • TRAINING CISSP (CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL)
  • TRAINING CDPSE (CERTIFIED DATA PRIVACY SOLUTION ENGINEER)
  • TRAINING CGEIT (CERTIFIED IN THE GOVERNANCE OF ENTERPRISE INFORMATION TECHNOLOGY)
  • TRAINING CRISC (CERTIFIED IN RISK AND INFORMATION SYSTEMS CONTROL)
  • TRAINING SCRUM MASTER AND PRODUCT OWNER
  • TRAINING SECURING & AUDITING MICROSERVICES APPLICATIONS
  • TRAINING COBIT 2019 FOUNDATION
  • TRAINING COBIT 2019 DESIGN & IMPLEMENTATION
  • TRAINING ITIL V4 FOUNDATION
  • TRAINING CSM - CERTIFIED SCRUM MASTER
  • TRAINING CERTIFIED INFORMATION PRIVACY PROFESSIONAL (CIPP)
  • TRAINING ITAM – (IT ASSET MANAGEMENT)
  • TRAINING DATA STORYTELLING (INFOGRAFIS)
  • TRAINING EFFECTIVE WRITING SKILLS
  • TRAINING OPERATIONS - CAPACITY MANAGEMENT
  • TRAINING HDFCNA - HDF CERTIFIED NIFI ARCHITECT
  • TRAINING ICT DOCUMENT MANAGEMENT
  • TRAINING TECHNICAL WRITING FOR SOFTWARE DEVELOPMENT
  • TRAINING MODERN ICT OPERATIONS MANAGEMENT
  • TRAINING IT RISK MANAGEMENT
  • TRAINING IT HELPDESK MANAGEMENT
  • TRAINING PAYMENT CARD INDUSTRY DATA SECURITY STANDARD - PCI DSS 4.0 LEAD AUDITOR
  • TRAINING PROJECT MANAGEMENT WITH AGILE (SCRUM, RAD, KANBAN, VMODEL)
  • TRAINING UI/UX DESIGN
  • TRAINING COMPTIA SECURITY+

Top Topics