HERY PURNAMA, SE.,MM.
MCP, PMP, CISM, CISSP, CISA, ITILF, CTFL, CDMP
CERTIFIED IT TRAINER - BANDUNG
SILABUS TRAINING
IT CYBER RISK SECURITY MANAGEMENT
DURATIONS : 3 DAYS (OFF/ONLINE TRAINING 09.00 – 16.00 )
DESCRIPTION : In this course you will gain a solid understanding of risk management principles, processes, frameworks and techniques that can be applied specifically to cyber security as well as risk in general.
You will learn how to identify, assess and articulate risk as well as options available for treating cyber security risk and which may be most appropriate for your situation.
This course also provides examples of tools and techniques as well as useful tips that can help you to successfully implement and maintain a risk management framework within your organization
TRAINING OBJECTIVES : • Develop an understanding of what risk is and how it can be managed.
• How to create a risk management framework within your organisation.
• How to identify, assess and articulate risk as well as identifying options for treatment and determining which is the most appropriate.
• How to perform detailed analysis of risk and develop risk treatment plans.
• How to apply risk management concepts in practice including developing a risk register, Cyber Security Strategy Plan, governance models, risk bowties and reporting.
REQUIREMENTS : No special requirements
PARTICIPANTS : - Information Technology Managers
- Information/Cyber Security Managers
- Information Security Professionals
- Anyone with an interest in gaining a general understanding of risk management as well as how it applies to information security
TRAINING TOPICS : Introduction
What Is Risk?
IT & Cyber Security Risk
Components of a Risk
Articulating Risk
Risk Management
What is Risk Management
Objectives of Risk Management
Risk Management vs Risk Minimisation
Risk Management Principles
Risk Management Framework
Mandate & Commitment
Designing your framework
Designing your framework – Organisational Context
Designing your framework - Establish Policy
Designing your framework - Accountability
Designing your framework - Organisational Integration
Designing your framework - Communication & Reporting
Designing your framework - Implementation
Designing your framework - Monitoring & Review
Designing your framework - Continual Improvement
The risk management process
The risk management process - Communication & Consultation
The risk management process - Context Establishment
The risk management process - Risk Assessment
The risk management process - Risk Treatment
The risk management process - Monitoring & Review
The risk management process - Auditability and Traceability
Risk Management - Maturity Models
Risk Management - Risk Assessment & Measurement
Risk Assessment & Measurement - Terminology
The risk management process (recap)
Risk Identification
Risk Analysys
Risk Analysis - Likelihood
Risk Analysis - Consequence/Impact
Risk Analysis - Consequence Examples
Risk Analysis - Risk Matrix
Risk Analysis - Analysis Example
Risk Evaluation
Risk Treatment
Risk Treatment Plan Example
Risk Treatment Considerations
Cyber Security Risk management in Practice
Creating an IT risk register
Example Excel risk register
Risk governance - lines of defence model
Developing Cyber Security Strategy Plan
Risk bowties
Next Recommendation Training : 1. CISM Exam Preparation Training
2. CISSP Exam Preparation Training
3. ISO 27001 Training
4. ISO 31000 Training
0 comments:
Post a Comment
Terima kasih telah mengunjungi halaman website kami, Jika ada pertanyaan terkait informasi di Atas silahkan isi Comment Box di bawah ini, Tim kami akan merespon komentar/ pertanyaan Anda paling lambat 2 x 24 Jam
Untuk respon cepat silahkan hubungi 0838-0838-0001 (Call/Whatsapp)
Regards,
Management,
www.purnamaacademy.com