Cyber Security For Executives

by ALC Training Claim Listing

With the cyber security threat landscape constantly evolving, Executives and Directors are increasingly aware that they have a critical role in ensuring the resilience of their organisation at this time of unprecedented risk.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

ALC Training Logo

img Duration

2 Hours +

Course Details

With the cyber security threat landscape constantly evolving, Executives and Directors are increasingly aware that they have a critical role in ensuring the resilience of their organisation at this time of unprecedented risk.

The need for appropriate cyber security frameworks, policies and approaches has never been greater and the lead has to come from the top. Ultimately it is the C-Suite and the Board that is responsible for effective enterprise risk management.

ALC has developed a range of fully-customisable presentations – one hour to one day – designed to give C-Suite executives, management, and even the Board, the information they need to better understand the nature and magnitude of the cyber risks they face, their own role in addressing these risks, and the range of actions available to maximise their organisation’s cyber resilience.
All sessions are conducted by a select group of senior practitioners well versed in presenting to top management. Presentations are available in person or in Live Virtual format.

 

Outcomes

Presentations are based on the following structure:

  • Introduction

  • Key topics

    • Defining Cyber Security

    • Threats to Your Assets

    • Physical Security

    • Privacy

    • Cyber Risk Management

    • Cyber Security Strategy

    • Cyber Security Resilience

  • Action Plan

  • Questions & Answers

  • Close

Who Should Attend

This short course has been designed for:

  • Business Executives

  • Directors

  • Senior Managers

  • Risk Practitioners

  • Chief Risk officers (CROs), CIOs, CISO

  • Information Security Managers

  • IT Audit and Assurance professionals

  • IT Risk Management professionals

 

Contents

Presentations for Cyber Security for Executives will draw from the topics below. The precise content and the amount of time spent one any topic can be readily adapted according to the audience and to emphasise different areas of concern. Customised content can be added as required.

Threats

  • Evolution of the Threat Landscape

  • Common Types of Malicious Software (Malware)

  • Advanced Persistent Threat (APT)

  • Ransomware Types

  • Ransomware Marketplace

  • Ransomware Payments

  • Ransomware Example

  • Ransomware Advice

  • Passwords

  • Passphrases

  • Phishing (Social Engineering Attack)

  • Phishing – Red Flags

  • Vishing (Voice Solicitation)

  • Spear Phishing

  • Whaling

  • Social Media

  • Cloud

  • Bring Your Own Device (BYOD)

  • The Deep Web versus The Dark Web

  • Identity Theft and Identity Fraud

  • Family Fraud

  • ACSC Top 4 and Essential 8

  • Patch Management

Physical Security

  • Building Security

  • Building Access (Cloning Cards)

  • Lock Picking

  • Tailgating

  • Restricted Work Areas

  • Clear Desk Policy

  • Clear Screen Policy

  • Dumpster Diving

  • Asset Disposal

  • Reporting Security Incidents

Privacy

  • Privacy Act Australia & New Zealand

  • Office of the Australian Information Commissioner (OAIC)

  • Data Breaches

Cyber Risk Management

  • Cyber security as a risk to business objectives

  • The systemic nature of cyber risks

  • Risk distribution and risk aggregation

  • Relevant laws, regulations and standards

  • Management of cyber risk

  • Integrating cyber risk into the organisation’s governance and management processes

  • Awareness of gap analysis and the use of a road map to increase the reliability of risk cyber management

  • Assessing the quality of cyber risk information via metric

Cyber Security Strategy

  • There are many cyber security strategies

  • Knowing which strategy to apply is daunting

  • Organisations need a starting point

  • No single strategy can prevent cyber incidents

  • The ACSC baseline – the Essential 8

Cyber Security Resiliences

  • Incident management

  • Detect

  • Respond

  • Recover

General Security Awareness

The human factor – what your staff do or don’t do – is the single biggest vulnerability in the cyber world. Each day we are bombarded by increasingly sophisticated threats that play on people’s susceptibilities. Addressing the human factor is now a key part of any cyber resilience strategy. It is much more than having a set of policies and procedures. It’s a mindset

  • Brisbane Branch

    Level 1, 9 McInroy Street Taringa, Brisbane
  • Melbourne Branch

    Level 18, 101 Collins Street, Melbourne
  • Perth Branch

    Level 28, AMP Tower, 140 St Georges Terrace, Perth
  • Sydney Branch

    Level 14, Lumley House 309 Kent Street, Sydney
  • Canberra Branch

    Suite 7.01, Level 7 10 Hobart Place, Canberra

Check out more Cybersecurity courses in Australia

Housley Logo

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents.

by Housley [Claim Listing ]
Lumify Group Logo

CompTIA Security+

CompTIA Security+ is a global certification that validates the baseline skills necessary to improve baseline security readiness and incident response by applying current best practices for preventing and addressing today’s threats.

by Lumify Group [Claim Listing ]
Trinity Institute Logo

Diploma of Information Technology (Cyber Security)

This qualification reflects a variety of information and communications technology roles where individuals have established specialised technical skills. Individuals in these roles carry out moderately complex tasks in a specialist field, working independently, as part of a team or leading a delive...

by Trinity Institute [Claim Listing ]
  • Price
  • Start Date
  • Duration
Torrens University Australia Logo

Cybersecurity

This Micro-credential introduces?the principles of cybersecurity and explores the?scale of the cybersecurity challenge globally, including the social factors informing?individual, organisational and international attitudes.

by Torrens University Australia [Claim Listing ]
  • Price
  • Start Date
  • Duration
ALC Training Logo

CCSP® Certified Cloud Security Professional

The cloud security certification is a 5-day course where you will gain a thorough understanding of the information security risks and mitigation strategies critical to data security in the cloud in this ISC2 Certified Cloud Security Professional (CCSP) Exam Preparation course.

by ALC Training [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy