With the cyber security threat landscape constantly evolving, Executives and Directors are increasingly aware that they have a critical role in ensuring the resilience of their organisation at this time of unprecedented risk.
With the cyber security threat landscape constantly evolving, Executives and Directors are increasingly aware that they have a critical role in ensuring the resilience of their organisation at this time of unprecedented risk.
The need for appropriate cyber security frameworks, policies and approaches has never been greater and the lead has to come from the top. Ultimately it is the C-Suite and the Board that is responsible for effective enterprise risk management.
ALC has developed a range of fully-customisable presentations – one hour to one day – designed to give C-Suite executives, management, and even the Board, the information they need to better understand the nature and magnitude of the cyber risks they face, their own role in addressing these risks, and the range of actions available to maximise their organisation’s cyber resilience.
All sessions are conducted by a select group of senior practitioners well versed in presenting to top management. Presentations are available in person or in Live Virtual format.
Outcomes
Presentations are based on the following structure:
Introduction
Key topics
Defining Cyber Security
Threats to Your Assets
Physical Security
Privacy
Cyber Risk Management
Cyber Security Strategy
Cyber Security Resilience
Action Plan
Questions & Answers
Close
Who Should Attend
This short course has been designed for:
Business Executives
Directors
Senior Managers
Risk Practitioners
Chief Risk officers (CROs), CIOs, CISO
Information Security Managers
IT Audit and Assurance professionals
IT Risk Management professionals
Contents
Presentations for Cyber Security for Executives will draw from the topics below. The precise content and the amount of time spent one any topic can be readily adapted according to the audience and to emphasise different areas of concern. Customised content can be added as required.
Threats
Evolution of the Threat Landscape
Common Types of Malicious Software (Malware)
Advanced Persistent Threat (APT)
Ransomware Types
Ransomware Marketplace
Ransomware Payments
Ransomware Example
Ransomware Advice
Passwords
Passphrases
Phishing (Social Engineering Attack)
Phishing – Red Flags
Vishing (Voice Solicitation)
Spear Phishing
Whaling
Social Media
Cloud
Bring Your Own Device (BYOD)
The Deep Web versus The Dark Web
Identity Theft and Identity Fraud
Family Fraud
ACSC Top 4 and Essential 8
Patch Management
Physical Security
Building Security
Building Access (Cloning Cards)
Lock Picking
Tailgating
Restricted Work Areas
Clear Desk Policy
Clear Screen Policy
Dumpster Diving
Asset Disposal
Reporting Security Incidents
Privacy
Privacy Act Australia & New Zealand
Office of the Australian Information Commissioner (OAIC)
Data Breaches
Cyber Risk Management
Cyber security as a risk to business objectives
The systemic nature of cyber risks
Risk distribution and risk aggregation
Relevant laws, regulations and standards
Management of cyber risk
Integrating cyber risk into the organisation’s governance and management processes
Awareness of gap analysis and the use of a road map to increase the reliability of risk cyber management
Assessing the quality of cyber risk information via metric
Cyber Security Strategy
There are many cyber security strategies
Knowing which strategy to apply is daunting
Organisations need a starting point
No single strategy can prevent cyber incidents
The ACSC baseline – the Essential 8
Cyber Security Resiliences
Incident management
Detect
Respond
Recover
General Security Awareness
The human factor – what your staff do or don’t do – is the single biggest vulnerability in the cyber world. Each day we are bombarded by increasingly sophisticated threats that play on people’s susceptibilities. Addressing the human factor is now a key part of any cyber resilience strategy. It is much more than having a set of policies and procedures. It’s a mindset
Who We Are And What We Do
ALC is a leading Australia-based provider of quality training for business and government, since 1994. Our focus is on best-practice methods and frameworks that help ensure you get the most out of your investment.
With offices in Sydney, Melbourne, Brisbane, Singapore and Kuala Lumpur, our courses are held regularly throughout Australia, New Zealand and South-East Asia. More than 55,000 people have trained with ALC.
Company Announcement
We are pleased to advise that as of 17 March 2023, ALC Training has become a part of the Tesserent Group of companies as the first key step of the new Tesserent Academy initiative.
The mission statement of the Tesserent Academy is to be the pre-eminent provider of cyber security education in the Asia-Pacific region. ALC, with its very strong background of nearly 30 years in information and cyber security training will provide Tesserent Academy with an immediate and commanding position in this sector.
By joining Tesserent, ALC will have access to a much greater range of resources which will lead to many new opportunities and significantly increased growth potential.
The focus will be on portfolio expansion, the development of new skills-based programs, and the creation of new certifications relevant to our region.
Why Choose Alc?
There are many providers of training, just as there are many providers of most services. So how do you choose?
Well, for starters, training for us is not a sideline activity – it is all that we do. And we have been doing it since March 1994. In that time, we have seen many training companies come and go. To be a market leader all this time, we must be doing something right.
We are a team of dedicated and capable people who care about what we do. We give it single-minded focus. We offer commitment, professionalism, and enthusiasm.
When You Train With ALC You Get:
If you are looking to develop a career in the IT industry, love new technology and are seeking employment in Cyber Security – this is the course for you.
This qualification reflects the role of individuals in a variety of information and communications technology (ICT) roles who have established specialised skills in a technical ICT function
You will learn a range of technical skills including how to implement network security infrastructure and detect breaches in network security, as well as stakeholder management. This course will provide you with a range of foundation knowledge and skills in website security, IT network testing, and
The ISACA® Certified in Governance of Enterprise IT (CGEIT)® certification is the world-leading vendor-neutral certification designed for IT professionals in large organisations who are responsible for directing, managing and supporting the governance of enterprise IT.
Nagios is an IT system monitoring tool that monitors a network for issues and resolves IT infrastructure problems. This instructor-led, live training (online or onsite) is aimed at intermediate-level systems administrators who wish to learn and utilize the advanced features and components of Nagio...
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy