Call Us

+13015921533

Cybersecurity Risk Management Training

2-Days of Cybersecurity/Risk Management/Assessments Training:

If your organization depends on IT-based systems and you are charged with responsibility for information security and risk management, our In-depth Cybersecurity/Risk Management/Assessments training will give your team the skills they need to do their jobs more effectively. They’ll understand the tools and techniques to be able to practically manage risks, regardless of their role in the business and their departments. Our recommendations are those working in the following departments/roles are encouraged to attend:

  • Board of Director’s
  • Executive’s Management Teams
  • Chief Financial Officer’s (CFO)
  • Business Development Officer’s
  • Quality Assurance Managers
  • Legal Advisor’s
  • Quality Control Team’s
  • Contracting officer’s (CO)
  • Contracting Officer’s Representative (COR)
  • Project Managers
  • Chief Operating Officer’s (COO)
  • Procurement Managers
  • IT Auditor’s and Information Assurance Manager’s
  • Software Developers
  • Business Continuity and Disaster Recovery Team’s (BCP/DRP) 

Cybersecurity Seminar Mission Statement on Risk Management Training:

Infosecact’s training mission emphasizes on a cohesive story with which techies and business managers can discuss the cybersecurity of business activities and know more about protecting company’s digital assets. Remember, we operate in a world full of risks, but instead, we must take simple precautions to help manage the risks that we think have the greatest potential to disrupt our lives.

Cybersecurity/Risk Management/Assessments Summary Learning objectives.

  • Cybersecurity efforts are all about Risk Management. In this seminar, you will learn about the techniques that Cybersecurity Analysts use to identify, assess, and manage a wide variety of risks.
  • You will learn about the differences between risk mitigation, risk avoidance, risk transference, and risk acceptance and when it is appropriate to use each.
  • You will learn about protecting companies’ business from Data theft, as digital theft is a global problem that isn’t impacted by geographical boundaries, socioeconomic conditions, or other on-the-ground factors.
  • Participants will learn the first step of proper digital asset protection is recognizing everything that has value for your business.
  • Participants will also explore on different types of security controls that organizations can use to mitigate risks.

Cybersecurity Risk Management/Assessment Training Session:

  1. Define Risk Management:
Upon completion of Risk Management Training Session, Participants shall able to:
  • Define risk management & Its role in the organization.
  • Begin using risk management techniques to identify & prioritize risk factors for information assets.
  • Assess risk based on the likelihood of adverse events & the effects on information assets when events occur.
  • Begin to document the results of risk identification.
  1. Information Security Management Training Session:
Upon Completion of Information Security Management Session, Participants Shall be able to:
  • Recognize the importance of information technology & understand who is responsible for protecting an organization’s information assets.
  • Know & understand the definition & key characteristics of information security.
  • Know & understand the definition & key characteristics of leadership & management.
  • Recognize the characteristics that differentiate information security management from general management.
  1. Planning of Security:
Upon completion of Planning Security session, Participants shall be able to:
  • Recognize the importance of planning & describe the principal components of organizational planning.
  • Know and understand the principal components of infosec system implementation planning as it functions within the organizational planning scheme.
  1. Planning for Contingencies:
Upon Completion of Planning for Contingencies Session, Participants Shall be Able to:
  • Understand the need for contingency planning.
  • Know the major components of contingency planning.
  • Create a simple set of contingency plans, using Business Impact Analysis.
  • Prepare and execute a test of contingency plans.
  • Understand the combined contingency plan approach.
  1. Information Security Policy:
Upon Completion of Security Policy session, Participants Shall be Able to:
  • Define information security policy & understand its central role in a successful infosec program.
  • Know the 3 major types of infosec policy often used & what goes into each type.
  • Develop, implement, & maintain various types of infosec policies.
  1. Developing the Security Program.
Upon completion of Developing the Security Program Session, Participants Shall be Able to:
  • Recognize & understand the organizational approaches to infosec.
  • List & describe the functional components of the infosec program.
  • Determine how to plan & staff an organization’s infosec program based on its size.
  • Evaluate the internal & external factors that influence the activities & organization of an infosect program.
  1. Risk Management: Identifying and Assessing Risk.
Upon Completion of Identifying and Assessing Risk Session, Participants Shall be able to:
  • Define risk management & its role in the organization.
  • Begin using risk management techniques to identify & prioritize risk factors for information assets.
  • Assess risk based on the likelihood of adverse events & the effects on information assets when events occur.
  • Begin to document the results of risk identification.

Bonus:    

100 multiple choice sample exam questions with answers on Cybersecurity Risk Management module to individuals preparing to sit for the Approved Baseline Certifications by the Department of Defense (DoD) 8570 for the Information Assurance (IA) Workforce. Ref URL below:

https://public.cyber.mil/cw/cwmp/dod-approved-8570-baseline-certifications/   

 

Two-Day Cybersecurity/Risk Management/Assessments Training Fee: $500.00

Tutor:

John W, Kiruri, M.S., CISA, CISM, SSCP

Cybersecurity Consultant and Trainer of Trainers (TOT).

Office: +12404132736 or +254702726262

e-mail: jkiruri@infosecact.com

Website: www.infosecact.com