Assessing Cyber Security Risk for Decision-makers and Leaders

Identify and protect your critical assets by performing your own risk assessments

Option 1-Face-to-Face Training

This cyber security course will enable decision-makers at all levels to focus on critical risks and impacts to the business. It will help inform senior management of the strategic and operational areas that require attention whilst maintaining transparency through the entire process.

 

In this two-day course, participants learn to perform information security risk assessments. Our approach provides organisations with a comprehensive methodology that focuses on information assets in their operational context. You will use the latest electronic risk management software throughout the course.

 

Throughout the course, you will participate in in-class exercises and discussions, including risk identification, analysis, and response activities.

 

After completing the course, attendees will be able to:

  • Gather and organise risk information via interviews, documentation reviews, and technical analysis

  • Create risk evaluation criteria 

  • Identify, analyse and prioritise information security risks.

  • Improve vulnerability management activities by viewing them in a risk context

  • Understand why managing operational risk is essential to managing enterprise risk

  • Develop risk response strategies appropriate for the organisation's business requirements

 

By focusing on operational risks to information assets, participants learn to view risk assessment in the context of the organisation's strategic objectives and risk tolerances. 

Option 2-Cyber Risk Assessment Online Training

The advantage of online training is that you can stop at each step and implement or research what you need before progressing to the next step. This method means that you will have completed your Cyber Risk Assessment on your organisation by the end of the course.

cyber_reconnaissance.png

It comes complete with all templates and training on conducting a Cyber Risk Assessment as per the Software Engineers Institute recommendations.

 

The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro™ method was developed by Carnegie Mellon University, Pittsburgh, USA.

 

The OCTAVE Allegro™ approach provides the Public and Private Sectors with a comprehensive methodology that focuses on information assets in their operational context. Cyber risks are identified and analysed based on where they originate, at the points where information is stored, transported, and processed. By focusing on operational risks to information assets, participants learn to view risk assessment in the context of the Public and Private Sectors strategic objectives and risk tolerances.

Who should attend the course?

  • Individuals who want to be able to perform their own in house risk assessments

  • C-Suite, Security professionals, business continuity planners, compliance personnel, risk managers and others

  • Personnel need to perform a formal risk assessment to satisfy PCI-DSS requirements

  • Information Technology technicians that want to increase their knowledge of cybersecurity

Cyber Quote 3.png
Cyber Quote 29.png
Cyber Quote 23.png