+44 845 528 0204
(How to successfully implement cybersecurity program for Your organisation)
Duration: 4 days
Developing an information security program that adheres to the principle of security as a business enabler is the first step in an enterprise’s effort to build an effective security program. Organizations must continually explore and assess information security risks to business operations; determine what policies, standards, and controls are worth implementing to reduce these risks; (3) promote awareness and understanding among the staff; and assess compliance and control effectiveness. As with other types of internal controls, this is a cycle of activity, not an exercise with a defined beginning and end.
Achieving certification as a "Certified Cybersecurity Program Implementer" offers a range of significant benefits in today's digitally driven business landscape. This certification signifies a professional's specialized competence in designing, executing, and managing effective cybersecurity programs within organizations. Certified individuals are equipped with the knowledge and skills necessary to identify and mitigate cyber threats, establish robust security frameworks, and ensure compliance with industry standards and regulations.
No | Program |
Day 1 | |
1. |
Part 1: Introduction to Information Security.
|
2. |
Part 2: Introduction to Information Security
|
3. |
Threats to Information Security
|
4. |
Understanding the Information Security Program Structure
|
5. |
About Your Information Security Policy-Part 1 The cornerstone of Policies.
|
Day 2 | |
6. |
About Your Information Security Policy- Part 2 The cornerstone of Policies.
|
7. |
Cybersecurity -Legal Definition of: -
|
8. |
Creating Policies: -
|
9. |
Asset Classification Why are assets classified? Classification Categories.
Employees Responsibilities |
10. |
Records Management Policy. Information Handling Standards matrix.
|
Day 3 | |
11. |
Information Classification Methodology. Authorization for Access
|
12. |
Access Control
|
13. |
Physical Security
|
14. |
Risk Analysis and Management.
|
15. |
Risk Analysis Process – Practical Session
|
Day 4 |
|