Data Integrity and Security

Managing Cyber Risk

Course Overview
Managing Cyber Risk is the second part of a two course series training program that assists senior executives and board members with better understanding how to understand and manage an organization’s cyber risk. This course provides an overview of cyber risk dashboards to help organizations successfully monitor and manage its cyber risk, and some best practices for creating and implementing a dashboard. This course also covers best practice recommendations and considerations to reduce cyber risk via policy and controls implementation across four broad categories: people, process, technology, and environment.

Despite the best defenses and preparation, the changes of an organization falling victim to a major cyber incident remain a reality. To address this reality, this course also details how an organization should react in the event of a data breach. It lays out broad recommendations on how to implement and execute against your incident response plan, crisis communications plans, and business continuity plans. The course highlights additional actions that help organizations manage longer-term post-breach impacts, from notifying stakeholders to conducting forensic investigations and determining post-incident lessons learned.



Learning Objectives:

After completing this course, participants should be able to:

Monitor:
  • Indicate how to strengthen the cyber workforce in your organization, including building a culture of cyber resiliency, identifying ways to better train and evaluate cyber security knowledge, and empowering cybersecurity leadership.
  • Specify the processes to measure and monitor cyber risk, including creating and implementing cyber risk dashboards and cybersecurity frameworks.
  • Recognize processes to manage cyber risk through establishment of response plans, audits and benchmarks, and purchase of cyber insurance.
  • Identify the key components of your technology ecosystem and prioritize your spending on cyber technology.
  • Recognize the benefits and importance of viewing your threat environment through organizational, industry, and geopolitical lenses and develop relationships with external resources--such as cyber threat intelligence, information sharing organizations, and law enforcement agencies--to monitor that environment.
  • Identify who in your organization is responsible for cybersecurity compliance and recognize the importance of relationships with regulators and law enforcement.

    React:
  • Define how your organization plans to detect, contain, remediate, and restore when dealing with the fallout from cyber incidents.
  • Specify how to notify stakeholders after an incident and how this fits into your broader incident response plan.
  • Specify how forensics investigations, legal defense, and audits are instrumental in the post-incident phase and the importance of conducting a thorough “lessons learned” after a cyber breach.

Content Partner:

SmartPros Ltd.

SmartPros Ltd. is a leader in online and offline continuing education for
accounting, finance and engineering professionals. With over 2,000 hours of
content, SmartPros has been providing mandatory continuing education
products since 1981. SmartPros provides services and content to its
professional and corporate clients, in a variety of media including Web, CD
ROM, and video. In the accounting market, SmartPros also has a predominant
news and information portal which receives 200,000+ visits per month and
provides services to over 100,000 subscribers. SmartPros' customers include
50% of the Fortune 500, as well as the major firms and associations in each
of its professional markets.


Prerequisites/Advanced Preparation:

None

Speaker / Author:

Jeffrey R. Welgan directs and oversees CyberVista’s Executive Training Programs, bringing a wealth of program management and threat intelligence experience to the CyberVista team. Jeff’s cyber expertise is rooted in all-source, strategic analysis of cyber threat actors, as well as nation-state cyber capabilities and doctrines. He led and managed a cyber threat intelligence capability at Booz Allen Hamilton, focusing primarily on specialized cyber threat studies for Fortune 100 commercial clients and for multiple government agencies, including the Defense Intelligence Agency, the Central Intelligence Agency, the National Security Agency, the Federal Bureau of Investigation, U.S. Cyber Command, U.S. Special Operations Command, the Department of the Treasury, and more.

Jeff previously served in the U.S. Navy both as an intelligence specialist and a search and rescue (SAR) swimmer. As an intelligence specialist, he managed and led a team of intelligence personnel through two deployments in support of Operations Enduring Freedom, Iraqi Freedom, and Noble Eagle. Jeff holds a B.A. in Political Science from Clarion University of Pennsylvania and an M.S. in Applied Intelligence from Mercyhurst University. He is also a certified Project Management Professional (PMP).

Software & Hardware Requirements:

  • 56k or Greater Internet Connection
  • Adobe Acrobat® Reader for the .pdf files
  • Modern DHTML Compatible Browser
  • Ram: 256 MB minimum
  • Sound card with speakers/headphones
  • Windows or Mac OS

Buy

Price (USD)

Standard Rate: $49.90

Details

Course Code : CVFEI02

Release Date : 11/08/2019
Expire Date : 11/08/2021
Credits :
CPE 2.00
QAS 2.00

Length : 1hr 40min
Course Level : Basic
Course Type : Self-Study
Passing Grade : 70%
Format Type : eLearning
Mobile Compatible
Field Of Study : Information Technology

Theme : Data Integrity and Security

Returning Subscribers

Login
- OR -
Login