Cyber Security Compliance

Cyber Security – Misguided Perceptions

Traditional approaches to information protection leaves systems drowning in alarms and alerts and business leaders grasping to review processes, policies and procedures to remediate potential risk.

Organisations often popularise the image of a cyber breach occurring from opportunistic  individuals relentlessly attacking applications on a public WIFI from an indiscrete location. The reality paints a very different picture.

The popular misguided malicious attacker theory has led organisations to take a defend/approach to their network perimeters implementing complex and expensive threat-centric solutions which have proven to deliver underwhelming results.

With international financial figures looking to reach $113 billion by 2020 is this approach an expensive break-fix without identifying the real issue?

Chris Ward is one of the world’s foremost authorities on Cybersecurity.… why…
  • 28 Years British Military
  • Created/Managed UK Military First Computer Security Incident Response Team (CSIRT)
  • Exec Chair of two 5-Eyes Military Cyber Committees
  • Carnegie Mellon University-Software Engineering Institute Cyber Instructor
  • New Zealand Defence Force (NZDF) 10 Years
  • Created/managed NZ First CSIRT in NZDF
  • Wrote NZDF Cyber Warfare Doctrine
  • SEI & Victoria University  Wellington (VUW) Partnered-VUW Research Fellow
  • Provision of Intel Agencies Training
  • University of the South Pacific Lecturer in Cyber & VUW Cybir

Train your Cyber Defenders

(Click on image to play video)

(Cyber Awareness Fundamentals for staff)

This training module is for all staff within an organisation who require awareness in Cyber and its relevance in the workplace and at home.

Traditional approaches to information protection leave systems drowning in alarms and alerts and business leaders grasping to review processes, policies and procedures to re mediate potential risk.

Train Your Cyber Defenders Module

Cyber Reconnaissance

(Click on image to play video)

(A Cyber Risk Assessment)

The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro™ method developed by the Carnegie Mellon University, Pittsburgh USA.

The OCTAVE Allegro™ approach provides the Public and Private Sectors a comprehensive methodology that focuses on information assets in their operational context. Cyber risks are identified and analysed based on where they originate, at the points where information is stored, transported, and processed. By focusing on operational risks to information assets, participants learn to view risk assessment in the context of the Public and Private Sectors strategic objectives and risk tolerances.

Cyber Reconnaissance Module

Creating the Cyber Battle Team

(Click on image to play video)

(Creating a Computer Security Incident Response Teams)

This course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT). This course provides a high-level overview of the key issues and decisions that must be addressed in establishing a CSIRT. As part of the course, attendees will develop an action plan that can be used as a starting point in planning and implementing their CSIRT. 

Creating the Cyber Battle Team Module

Managing the Cyber Battle Team

(Click on image to play video)

(Managing Computer Security Incident Response Teams)

This course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team. 

The course provides insight into the work that CSIRT staff may be expected to handle. The course also provides prospective or current managers with an overview of the incident handling process and the types of tools and infrastructure needed to be effective. 

Managing the Cyber Battle Team Module

Engaging in Cyber Battle

(Click on image to play video)

(Fundamentals of Cyber Incident handling)

This course provides foundational knowledge for those in security-related roles who need to understand the functions of an incident management capability and how best to perform those functions. It is recommended for those new to incident handling or security operations work.

The course introduces the basic concepts and functions of incident management. The course addresses where incident management activities fit in the information assurance or information security ecosystem and covers the key steps in the incident handling lifecycle. Discussions include topics on security operations services, intruder threats, and the nature of incident response activities. Course modules present standard practices to enable a resilient incident management capability.

Engaging the Cyber Battle Module

Cyber Bootcamp-Preparing for the Attack

(Click on image to play video)

(Cyber Essentials for Managers)

This course is designed for managers who need to know the fundamentals that will assist in reducing the risk of a Cyber-attacks and prepare an organisation for such an event. This course provides a high-level overview of the essential aspects to Cyber and is non-technical. decisions that must be addressed in establishing a CSIRT.

Cyber Bootcamp – Preparing for the Attack Module