Cyber Security – Misguided Perceptions
Traditional approaches to information protection leaves systems drowning in alarms and alerts and business leaders grasping to review processes, policies and procedures to remediate potential risk.
Organisations often popularise the image of a cyber breach occurring from opportunistic individuals relentlessly attacking applications on a public WIFI from an indiscrete location. The reality paints a very different picture.
The popular misguided malicious attacker theory has led organisations to take a defend/approach to their network perimeters implementing complex and expensive threat-centric solutions which have proven to deliver underwhelming results.
With international financial figures looking to reach $113 billion by 2020 is this approach an expensive break-fix without identifying the real issue?
Chris Ward is one of the world’s foremost authorities on Cybersecurity.… why…
The course is aimed at Managers to help them establish their employee contracts and induction processes.
Train your Cyber Defenders
(Cyber Awareness Fundamentals for staff)
This training module is for all staff within an organisation who require awareness in Cyber and its relevance in the workplace and at home.
Traditional approaches to information protection leave systems drowning in alarms and alerts and business leaders grasping to review processes, policies and procedures to re mediate potential risk.
(A Cyber Risk Assessment)
The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro™ method developed by the Carnegie Mellon University, Pittsburgh USA.
The OCTAVE Allegro™ approach provides the Public and Private Sectors a comprehensive methodology that focuses on information assets in their operational context. Cyber risks are identified and analysed based on where they originate, at the points where information is stored, transported, and processed. By focusing on operational risks to information assets, participants learn to view risk assessment in the context of the Public and Private Sectors strategic objectives and risk tolerances.
Creating the Cyber Battle Team
(Creating a Computer Security Incident Response Teams)
This course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT).
This course provides a high-level overview of the key issues and decisions that must be addressed in establishing a CSIRT. As part of the course, attendees will develop an action plan that can be used as a starting point in planning and implementing their CSIRT.
Managing the Cyber Battle Team
(Managing Computer Security Incident Response Teams)
This course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team.
The course provides insight into the work that CSIRT staff may be expected to handle. The course also provides prospective or current managers with an overview of the incident handling process and the types of tools and infrastructure needed to be effective.
Cyber Bootcamp-Preparing for the Attack
(Cyber Essentials for Managers)
This course is designed for managers who need to know the fundamentals that will assist in reducing the risk of a Cyber-attacks and prepare an organisation for such an event.
This course provides a high-level overview of the essential aspects to Cyber and is non-technical. decisions that must be addressed in establishing a CSIRT.