Cyber Security For Executives

by ALC Training Claim Listing

With the cyber security threat landscape constantly evolving, Executives and Directors are increasingly aware that they have a critical role in ensuring the resilience of their organisation at this time of unprecedented risk.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

ALC Training Logo

img Duration

2 Hours +

Course Details

With the cyber security threat landscape constantly evolving, Executives and Directors are increasingly aware that they have a critical role in ensuring the resilience of their organisation at this time of unprecedented risk.

The need for appropriate cyber security frameworks, policies and approaches has never been greater and the lead has to come from the top. Ultimately it is the C-Suite and the Board that is responsible for effective enterprise risk management.

ALC has developed a range of fully-customisable presentations – one hour to one day – designed to give C-Suite executives, management, and even the Board, the information they need to better understand the nature and magnitude of the cyber risks they face, their own role in addressing these risks, and the range of actions available to maximise their organisation’s cyber resilience.
All sessions are conducted by a select group of senior practitioners well versed in presenting to top management. Presentations are available in person or in Live Virtual format.

 

Outcomes

Presentations are based on the following structure:

  • Introduction

  • Key topics

    • Defining Cyber Security

    • Threats to Your Assets

    • Physical Security

    • Privacy

    • Cyber Risk Management

    • Cyber Security Strategy

    • Cyber Security Resilience

  • Action Plan

  • Questions & Answers

  • Close

Who Should Attend

This short course has been designed for:

  • Business Executives

  • Directors

  • Senior Managers

  • Risk Practitioners

  • Chief Risk officers (CROs), CIOs, CISO

  • Information Security Managers

  • IT Audit and Assurance professionals

  • IT Risk Management professionals

 

Contents

Presentations for Cyber Security for Executives will draw from the topics below. The precise content and the amount of time spent one any topic can be readily adapted according to the audience and to emphasise different areas of concern. Customised content can be added as required.

Threats

  • Evolution of the Threat Landscape

  • Common Types of Malicious Software (Malware)

  • Advanced Persistent Threat (APT)

  • Ransomware Types

  • Ransomware Marketplace

  • Ransomware Payments

  • Ransomware Example

  • Ransomware Advice

  • Passwords

  • Passphrases

  • Phishing (Social Engineering Attack)

  • Phishing – Red Flags

  • Vishing (Voice Solicitation)

  • Spear Phishing

  • Whaling

  • Social Media

  • Cloud

  • Bring Your Own Device (BYOD)

  • The Deep Web versus The Dark Web

  • Identity Theft and Identity Fraud

  • Family Fraud

  • ACSC Top 4 and Essential 8

  • Patch Management

Physical Security

  • Building Security

  • Building Access (Cloning Cards)

  • Lock Picking

  • Tailgating

  • Restricted Work Areas

  • Clear Desk Policy

  • Clear Screen Policy

  • Dumpster Diving

  • Asset Disposal

  • Reporting Security Incidents

Privacy

  • Privacy Act Australia & New Zealand

  • Office of the Australian Information Commissioner (OAIC)

  • Data Breaches

Cyber Risk Management

  • Cyber security as a risk to business objectives

  • The systemic nature of cyber risks

  • Risk distribution and risk aggregation

  • Relevant laws, regulations and standards

  • Management of cyber risk

  • Integrating cyber risk into the organisation’s governance and management processes

  • Awareness of gap analysis and the use of a road map to increase the reliability of risk cyber management

  • Assessing the quality of cyber risk information via metric

Cyber Security Strategy

  • There are many cyber security strategies

  • Knowing which strategy to apply is daunting

  • Organisations need a starting point

  • No single strategy can prevent cyber incidents

  • The ACSC baseline – the Essential 8

Cyber Security Resiliences

  • Incident management

  • Detect

  • Respond

  • Recover

General Security Awareness

The human factor – what your staff do or don’t do – is the single biggest vulnerability in the cyber world. Each day we are bombarded by increasingly sophisticated threats that play on people’s susceptibilities. Addressing the human factor is now a key part of any cyber resilience strategy. It is much more than having a set of policies and procedures. It’s a mindset

  • Brisbane Branch

    Level 1, 9 McInroy Street Taringa, Brisbane
  • Melbourne Branch

    Level 18, 101 Collins Street, Melbourne
  • Perth Branch

    Level 28, AMP Tower, 140 St Georges Terrace, Perth
  • Sydney Branch

    Level 14, Lumley House 309 Kent Street, Sydney
  • Canberra Branch

    Suite 7.01, Level 7 10 Hobart Place, Canberra

Check out more Cybersecurity courses in Australia

The Gordon Skills Logo

Certificate IV in Cyber Security

If you are looking to develop a career in the IT industry, love new technology and are seeking employment in Cyber Security – this is the course for you.

by The Gordon Skills [Claim Listing ]
Infotech Professionals Pty Ltd. Logo

Diploma of Information Technology (Cyber Security)

This qualification reflects the role of individuals in a variety of information and communications technology (ICT) roles who have established specialised skills in a technical ICT function

by Infotech Professionals Pty Ltd. [Claim Listing ]
Study Gurus Logo

Certificate IV In Cyber Security

You will learn a range of technical skills including how to implement network security infrastructure and detect breaches in network security, as well as stakeholder management. This course will provide you with a range of foundation knowledge and skills in website security, IT network testing, and

by Study Gurus [Claim Listing ]
ALC Training Logo

CGEIT® Certified in Governance of Enterprise IT

The ISACA® Certified in Governance of Enterprise IT (CGEIT)® certification is the world-leading vendor-neutral certification designed for IT professionals in large organisations who are responsible for directing, managing and supporting the governance of enterprise IT.

by ALC Training [Claim Listing ]
NobleProg (Australia) Logo

Advanced Nagios Training Course

Nagios is an IT system monitoring tool that monitors a network for issues and resolves IT infrastructure problems. This instructor-led, live training (online or onsite) is aimed at intermediate-level systems administrators who wish to learn and utilize the advanced features and components of Nagio...

by NobleProg (Australia) [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy