Professional Training

Cybersecurity: Managing Risk in the Information Age

London Premier Centre, In London (+7 locations)
Length
10 days
Price
7,650 - 8,500 GBP excl. VAT
Next course start
29 April, 2024 (+67 start dates)
Course delivery
Classroom
Length
10 days
Price
7,650 - 8,500 GBP excl. VAT
Next course start
29 April, 2024 (+67 start dates)
Course delivery
Classroom
Leave your details so the provider can get in touch

Course description

News of large-scale cybersecurity threats and cyberattacks dominate the headlines all too often in the Information Age: hackers exploiting vulnerabilities of retail giants, foreign influence in elections, and new forms of ransomware underscore the importance of preparing for these types of emerging threats.

Businesses, governments, financial institutions, and public sector organizations collect, store, and process vast amounts of sensitive and valuable data. These organizations have now become targets of groups seeking to wreak havoc on vulnerable systems and potentially disrupting everyday business functions. As a result, cyber risk management has become a fundamental component of business operations, and understanding and mitigating risk has become an essential skill for business leaders, thought leaders, analysts, as well as security and technology specialists.

Cybersecurity: Managing Risk in the Information Age is a course that equips students with a comprehensive understanding of how to identify and manage operational risk, litigation risk, and reputational risk. The course will help articipants assess and mitigate specific vulnerabilities within an organization’s networks, systems, and data in order to provide the knowledge and skills to protect the integrity, security, and confidentiality of their digital assets.

Upcoming start dates

Choose between 67 start dates

29 April, 2024

  • Classroom
  • Kuala Lumpur

6 May, 2024

  • Classroom
  • Paris

6 May, 2024

  • Classroom
  • Singapore

20 May, 2024

  • Classroom
  • Amsterdam

20 May, 2024

  • Classroom
  • Barcelona

20 May, 2024

  • Classroom
  • Dubai

20 May, 2024

  • Classroom
  • London

27 May, 2024

  • Classroom
  • Istanbul

27 May, 2024

  • Classroom
  • Kuala Lumpur

3 June, 2024

  • Classroom
  • Paris

3 June, 2024

  • Classroom
  • Singapore

17 June, 2024

  • Classroom
  • Amsterdam

17 June, 2024

  • Classroom
  • Barcelona

17 June, 2024

  • Classroom
  • Dubai

17 June, 2024

  • Classroom
  • London

24 June, 2024

  • Classroom
  • Istanbul

24 June, 2024

  • Classroom
  • Kuala Lumpur

1 July, 2024

  • Classroom
  • Paris

1 July, 2024

  • Classroom
  • Singapore

15 July, 2024

  • Classroom
  • Amsterdam

15 July, 2024

  • Classroom
  • Barcelona

15 July, 2024

  • Classroom
  • Dubai

15 July, 2024

  • Classroom
  • London

22 July, 2024

  • Classroom
  • Istanbul

29 July, 2024

  • Classroom
  • Kuala Lumpur

5 August, 2024

  • Classroom
  • Paris

5 August, 2024

  • Classroom
  • Singapore

19 August, 2024

  • Classroom
  • Amsterdam

19 August, 2024

  • Classroom
  • Barcelona

19 August, 2024

  • Classroom
  • Dubai

19 August, 2024

  • Classroom
  • London

26 August, 2024

  • Classroom
  • Istanbul

26 August, 2024

  • Classroom
  • Kuala Lumpur

2 September, 2024

  • Classroom
  • Paris

2 September, 2024

  • Classroom
  • Singapore

16 September, 2024

  • Classroom
  • Amsterdam

16 September, 2024

  • Classroom
  • Barcelona

16 September, 2024

  • Classroom
  • Dubai

16 September, 2024

  • Classroom
  • London

23 September, 2024

  • Classroom
  • Istanbul

30 September, 2024

  • Classroom
  • Kuala Lumpur

7 October, 2024

  • Classroom
  • Paris

7 October, 2024

  • Classroom
  • Singapore

21 October, 2024

  • Classroom
  • Amsterdam

21 October, 2024

  • Classroom
  • Barcelona

21 October, 2024

  • Classroom
  • Dubai

21 October, 2024

  • Classroom
  • London

28 October, 2024

  • Classroom
  • Istanbul

28 October, 2024

  • Classroom
  • Kuala Lumpur

28 October, 2024

  • Classroom
  • Paris

28 October, 2024

  • Classroom
  • Singapore

4 November, 2024

  • Classroom
  • Paris

4 November, 2024

  • Classroom
  • Singapore

18 November, 2024

  • Classroom
  • Amsterdam

18 November, 2024

  • Classroom
  • Barcelona

18 November, 2024

  • Classroom
  • Dubai

18 November, 2024

  • Classroom
  • London

25 November, 2024

  • Classroom
  • Istanbul

25 November, 2024

  • Classroom
  • Kuala Lumpur

2 December, 2024

  • Classroom
  • Paris

2 December, 2024

  • Classroom
  • Singapore

16 December, 2024

  • Classroom
  • Amsterdam

16 December, 2024

  • Classroom
  • Barcelona

16 December, 2024

  • Classroom
  • Dubai

16 December, 2024

  • Classroom
  • London

23 December, 2024

  • Classroom
  • Istanbul

30 December, 2024

  • Classroom
  • Kuala Lumpur

Suitability - Who should attend?

Cybersecurity: Managing Risk in the Information Age training course is designed for:

  • Leaders at all levels who must pilot their organization through the complexity of a dynamic cybersecurity environment and mobilize appropriate resources to maintain stable business operations.
  • Technology specialists aspiring to a leadership role, as well as security experts who need to upskill in such a rapidly evolving field.
  • Management professionals, analysts, and technical writers who must interpret and communicate the implications of cyber threats to stakeholders will benefit from thisprofessional development experience.

Outcome / Qualification etc.

At the end of the Cybersecurity: Managing Risk in the Information Age trai ning course, you will be able to:

  • You'll be shown how to critically analyze an organization’s risk profile, not only taking into account possible threats, but also the governance structure. and systems that have, or have not, been put in place to manage cyber risk.
  • You'll also explore recommended strategies for responding to a cyberattack, starting with identifying and communicating detection of a security breach, to ensuring that the attack is contained to prevent further damage.
  • You will also draw your attention to the legal and compliance regulations that ensure organizations remain compliant with both preventative and reporting requirements.
  • You'll have developed the appropriate knowledge to design and successfully implement a risk mitigation strategy for an organization.

Training Course Content

Day 1

Cybersecurity Risk is Business Risk

  • Define the key concepts necessary to understand the function of cyber risk management.
  • Discuss why the current cyber landscape poses a threat to organizations' cybersecurity.
  • Explain how cyber risk management can protect organizations from cyber risks.
  • Identify the three principal risks of a cyber attack.
  • Show how cyber risk management mitigates the business risk of cyberattacks.

Day 2

Identifying Cyber Threats

  • Demonstrate how the internet works.
  • Illustrate a method of cyber attack.
  • Identify types of threat actors.
  • Discuss sectors typically targeted by cyber threat actors.
  • Relate the increasing prevalence of cyber attacks to current geopolitical tensions.
  • Identify risks posed by insider threat actors.
  • Investigate the threats to an organization's critical business systems and data.

Day 3

Identifying Important Business Systems and Assets

  • Discuss the importance of protecting an organization's critical assets.
  • Identify the critical systems that are vulnerable to cyberattack.
  • Identify types of networks and their vulnerabilities.
  • Choose the types of data that should be prioritized when securing an organization's networks.
  • Investigate the business critical systems, networks, and data that are essential for an organization's effective functioning.
  • Assess the vulnerabilities of an organization's business critical systems, networks, and data.

Day 4

The Role of Leadership in Managing Cyber Risk

  • Outline the importance of leadership in cybersecurity governance.
  • Discuss the importance of effective management processes.
  • Articulate management processes that are crucial to managing cyber risk for an organization.
  • Investigate the need for cybersecurity awareness training.
  • Recommend a cybersecurity leadership plan for an organization

Day 5

Understanding Your Technology

  • Identify the important nexus between physical security and cybersecurity.
  • Articulate the types of questions needed to establish an overview of an organization's cybersecurity.
  • Describe types of technologies that effectively protect networks.

Day 6

Identify the key elements of sound data governance

  • Apply appropriate methods for protecting an organization's systems, networks, and data.
  • Deduce types of questions necessary to determine the technologies implemented in an organization's cybersecurity.

Day 7

Cyber Risk and The Law

  • Recognize the risk of failing to take into account legal considerations surrounding cybersecurity.
  • Identify the various sources of legal obligations and best practice standards.
  • Articulate ways to mitigate legal and reputational risks.
  • Interpret the role of the government in regulating cybersecurity.
  • Illustrate the benefits of disclosure and information sharing following a breach.
  • Identify the legal risks inherent in third-party relationships.
  • Select questions to assess an organization's legal and compliance cyber risks.

Day 8

Incident Response and Accountability

  • Recognize proactive measures that should contribute to an incident response strategy.
  • Identify best practices in detecting and containing a cyber attack.
  • Analyze the roles of key actors in the response to a cyber attack.

Day 9

Articulate the appropriate communication strategy following a cyber attack

  • Decide on processes to eradicate an attack, and recover affected systems,networks, and data.
  • Evaluate the effectiveness of the actions taken during a cyberattack.
  • Propose an incident response plan to prepare an organization in the event of an attack.

Day 10

Designing and Implementing a Mitigation Strategy

  • Identify cyberthreats and mitigation strategies of future cyber landscapes.
  • Review the components included in a risk mitigation strategy.
  • Interpret challenges inherent in implementing a cyber risk mitigation strategy.
  • Select metrics that are most appropriate for evaluating the cybersecurity of an organization or sector.
  • Develop a cyber risk mitigation strategy specific to your organization.

Request info

Contact course provider

Fill out your details to find out more about Cybersecurity: Managing Risk in the Information Age.

  Contact the provider

  Get more information

  Register your interest

Country *

reCAPTCHA logo This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
London Premier Centre
47-49 Park Royal Road
NW10 7LQ London

London Premier Centre

London Premier Centre is a UK leading training provider based in London and specialises in international short courses. Our inspiring, comprehensive portfolio of more than 400 professional development courses and seminars covers a wide range of professions from Administration, Leadership,...

Read more and show all courses with this provider

Ads