3 Day Masterclass in Cybersecurity Asia | Terrapinn Training
3 day Masterclass

Cybersecurity

LATEST INDUSTRY INSIGHTS IDENTIFY THREATS & OPPORTUNITIES DEVELOP A CYBERSECURITY PLAN

Learn to protect your business from outside and internal threats

Join renowned Finance Author Edgar Perez to gain a comprehensive overview of the fast-growing field of cybersecurity and learn how to develop and implement an effective cybersecurity plan in your organisation.

Learn bulb

expand your knowledge

Understand enterprise cybersecurity and identify immediate security needs with actionable steps

Learn bulb

address key challenges

Learn how to better enable security threat reduction and mission security reliability

Learn bulb

get the latest insight

Get up to speed on international approaches and frameworks for effective cybersecurity practices

DO YOU KNOW HOW TO HANDLE CYBERSECURITY THREATS?

As Internet usage becomes increasingly widespread and information technology ever more complex, cybersecurity is becoming an increasingly important and business-critical field.

Are you and your organisation effectively prepared to handle cybersecurity threats? Do you know how to identify threats, address challenges and apply a cybersecurity framework?

In just 3 days you will:

  • Gain a comprehensive understanding of cybersecurity and its key aspects
  • Get to grips with various cybersecurity testing methods
  • Get up to speed on the basics of security architecture
  • Learn valuable system administration techniques for executives
  • Master the cybersecurity framework and its five core functions
  • Discover how to establish or improve your cybersecurity program
  • Gain an overview of cyber network defence
  • Consider how the “weak human link” can become the organisation’s greatest strength
  • Look at the four components of the cyber preparedness continuum

Organisations that will benefit:

  • All Forward Thinking Companies
  • Insurance Companies
  • Vendors
  • Banks & Financial Services
  • Retail Companies
  • Manufacturing Companies
  • Internet Security Services
  • Government & Regulators

Who will attend:

  • C-Suite Executives: CIOs, CTO, CCOs, CEOs, CFOs, COOs
  • CISO
  • Chief Risk Officer
  • Security Analysts
  • Security Engineers
  • Security Architects
  • Security Administrators
  • Corporate Strategists
  • IT Managers
  • Data Security & Protection
  • Software Developers

Course Agenda

  • Introduction
  • Speed Networking
  • Cybersecurity fundamentals
  • Understanding the cybersecurity testing method
  • The basics of security architecture
  • System administration for executives
  • Introduction to the cybersecurity framework
  • Current cybersecurity posture
  • Target state for cybersecurity
  • Opportunities for improvement
  • Progress toward the target state
  • The five framework core functions: Identify, Protect, Detect, Respond, Recover
  • Establishing or improving a cybersecurity program
  • Identifying business/mission objectives and high level organisational priorities
  • Identifying related systems and assets, regulatory requirements, and overall risk approach
  • Developing a current profile by indicating the degree of preparedness achieved
  • Conduct a risk assessment: Analysing the likelihood of a cybersecurity event
  • Create a target profile
  • Determining gaps between current and target profiles
  • Implement action plan
  • How to continuously improve the enterprise process for defending IT assets
  • How investigations are based upon the scientific method to focus activities
  • Observation
  • Hypothesis
  • Evaluation
  • Prediction
  • Empowering people to resolve the problem with guidance and mentoring
  • Social engineering: how the “weak human link” can become the organisation’s greatest strength
  • Employee responsibility for cybersecurity
  • Assessing the quantity and quality of the cybersecurity workforce
  • Shortcomings & challenges in meeting cybersecurity workforce needs
  • Assess the effectiveness of current professionalization tools
  • Coordination: How the private sector cooperates and coordinates with the security community
  • Information sharing: What kind of information should be shared, who should share information, and the thresholds to share information
  • Planning and readiness: What effective coordination structures and processes are needed to engage all relevant stakeholders in planning for cyber incidents
  • Continuous Improvement: How to plan for and exercise scenarios involving
  • Wrap

For further information please call: +44 (0)207 092 1045

  • “The depth and knowledge of my trainer was extremely impressive. In 3 days I have had, without a doubt, a masterclass on the industry. Truly world class.”

    - Gordon Dowall Potter, Past Delegate

  • “Well worth 3 days of study!”

    - Syed Hamza, Past Delegate

  • “The training was excellent! I give it a 10 and will get my trainer's support for my next challenges.”

    - Head of Partnerships & Customer Loyalty at Avis Budget, Past Delegate

  • “Extremely constructive course with a very good dynamic and passionate trainer.”

    - Managing Director at BNP Paribas, Past Delegate

  • “Impressive and cooperative trainer who wanted to make sure the delegates understood.”

    - Budgeting, Planning & Reporting Manager, Past Delegate

IN-HOUSE

We can come to you too! If you have a team of six or more, why not hold a private course? Our experts come to you and the course is tailored to your requirements.

Call +44 (0)20 7092 1045 (United Kingdom)
or +65 6322 2333 (Asia Pacific)
for more details

FIND OUT MORE