Executive Cyber Security Training. One Day Training Course



Similar documents
CYBER RISK INTERNATIONAL COMPANY PROFILE

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Threat Summit Brochure

Defending Against Data Beaches: Internal Controls for Cybersecurity

The EU s approach to Cyber Security and Defence

Compliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards

The Next Generation of Security Leaders

Into the cybersecurity breach

Cyber Risk Management with COBIT 5

Certified Cyber Security Analyst VS-1160

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Promoting a cyber security culture and demand compliance with minimum security standards;

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

Executive Management of Information Security

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER am 1.00pm Green Park Conference Centre, Reading

Information Security and Risk Management

COMPANY PROFILE REV 4.0

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Big 4 Information Security Forum

Security Risk Management Strategy in a Mobile and Consumerised World

The FBI and the Internet

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

New challenges in Data privacy.

Cybersecurity: Protecting Your Business. March 11, 2015

Who s Doing the Hacking?

A Cyber Security Integrator s perspective and approach

How do we Police Cyber Crime?

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBER SECURITY FOUNDATION - OUTLINE

Protecting Malaysia in the Connected world

Cybersecurity. Are you prepared?

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

September 20, 2013 Senior IT Examiner Gene Lilienthal

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

What keep the CIO up at Night Managing Security Nightmares

KEY TRENDS AND DRIVERS OF SECURITY

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

October 24, Mitigating Legal and Business Risks of Cyber Breaches

FBI CHALLENGES IN A CYBER-BASED WORLD

Database Security and Auditing

North Texas ISSA CISO Roundtable

SECURITY. Risk & Compliance Services

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Unit 3 Cyber security

Jibran Ilyas DIRECTOR

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

U. S. Attorney Office Northern District of Texas March 2013

Presented By: Corporate Security Information Security Treasury Management

IT Security Management 100 Success Secrets

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

Caretower s SIEM Managed Security Services

An enterprise grade information security & forensic technical team

Certified Cyber Security Analyst VS-1160

Digital Infrastructure - A Model For Success

Italy. EY s Global Information Security Survey 2013

The Hunt for Fraud. September 25, Seminar / Training. September 26, 2014

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

CONSULTING IMAGE PLACEHOLDER

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Some thoughts about cloud computing risks. Andris Soroka 28 th of January, 2015 Riga, Latvia

Name of presentation Company name

BT Assure Threat Intelligence

Developments in cybercrime and cybersecurity

Internet Safety and Security: Strategies for Building an Internet Safety Wall

2015 Information Security Awareness Catalogue

Fostering Incident Response and Digital Forensics Research

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

CYBER ATTACKS CASHING IN ON RETAILERS: A WEBINAR ON CYBERSECURITY

Developing a robust cyber security governance framework 16 April 2015

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

InfoSec Academy Forensics Track

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

How To Secure An Extended Enterprise

Beyond the Hype: Advanced Persistent Threats

Establishing a State Cyber Crimes Unit White Paper

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance

The Dow Chemical Company. statement for the record. David E. Kepler. before

CFIR - Finance IT 2015 Cyber security September 2015

GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY

Developing a Mature Security Operations Center

Auditing emerging cyber threats and IT controls

Gregg Gerber. Strategic Engagement, Emerging Markets

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Delegate Invitation & Information Pack 26 th 28 th July 2011, Speke Resort & Conference Centre Munyonyo, Kampala, Uganda

Transcription:

Executive Cyber Security Training One Day Training Course

INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand and manage the associated threats and relevant risks? The first step for an organization is to understand the landscape. They need to understand the motivations and mechanics behind the threats. It is also imperative for every organization to augment their current risk management program to deal with the specific nuances of cyber threats. This one day intensive course specifically developed for those with this responsibility will fast track delegates to an appropriate level of understanding of what is real and what is hype. Understanding the various vectors of threats, being able to identify risks, the consequences and likelihood of particular instances will greatly assist organizations in developing their risk treatments and applying the relevant controls. Ideal for those working in IT, Risk or Senior Management the syllabus has been developed and will be delivered by one of the world s leading cyber threat experts. Although the subject matter is often of a technical nature every effort is made to keep this a non technical training event. Technical terms and definitions are explained throughout the syllabus and delegates will leave with a realistic understanding of the cyber threat landscape. WHAT WILL I LEARN? You will learn to understand the landscape of cyber threats. The different types and motivational factors behind such incidents. Delegates will be armed with the knowledge on how to identify such risks within their organization and understand why they may become a Cyber Target. A review of the comprehensive one day syllabus will show how thoroughly this subject will be covered and how valuable the lessons learned will be to participants. Cost Consequence 2 P a g e w w w. p a u l c d w y e r. c o m

WHAT IS THE COURSE STRUCTURE? This intensive, fast paced course covers a comprehensive syllabus in an as non technical fashion as possible. COURSE OUTLINE Day One Executive Cyber Security Training What are Cyber Threats? What is Cybercrime? The Cybercrime Threat o Examples o Characteristics o Categories o Statistics o Traditional o Sector Specific o Grouping Threats Cybercrime and Cyberwar o Cyberwar o Cyberterrorism o Cyber Espionage o The Links What s Driving the Cybercrime Economy o The Vulnerability Business o Hactivisim o Financial Gain o Information Gain o The Recession Computer Misuse Legislation o Ireland o UK o US o Europe o Global o European Convention On Cyber Crime o Directors Liability o Developments and Trends in Legislation Law Enforcement o International Projects Crimeware o Phishing o Trojan o Crimeware Toolkits o Crimeware Features o Other Threats Attack Vectors Overview o Phishing Development o Fast Flux Phishing & Pharming o Evolution of Techniques o Categories of Trojans o Form Grabbing o Keystroke Loggers o Direct Attacks o Screen Scraping o Loaders & Backdoors o Rootkits o Database Timing Attacks o Laptop theft o Advanced Persistent Threats - APT o Pump & Dump o DDoS o Combination Attacks o Non Technical Deep Dive on DDoS o Overview of Botnets 3 P a g e w w w. p a u l c d w y e r. c o m

o International Crime Networks Progression of Cybercrime o From a Macro Level o Cybercrime Syndicates o Key Targets Financial Institutions o From Bang to Flash The Economic Model of Cybercrime o Meet the Actors o How Does it All Gel? o Cashing Out Factors o Buying & Selling Information on the Black Stock Market o Moving Money o Carding and Forums o Notable Carders o Price Lists o Factors the Drive Price o Money Mule Operations o Evolution of Techniques o o o Motivation behind DDoS Attacks Main types of DDoS Attacks Mitigation Strategies The Threat to Our Way of Life o Critical National Infrastructure o Cyberwarfare o Espionage & Economic War Counter Intelligence The Human Element Trends & Evolution The Future Management Strategy WHO SHOULD ATTEND? Anyone with responsibility for risk or cyber related risks within an organization. CxO s Risk Professionals IT Professionals Security Professionals Senior managers who are responsible for managing risk and/or embedding effective systems of corporate governance. Chief executives and heads of departments who require a better understanding of cyber risk management and the role it should play within their organizations. Insurance managers, brokers, safety practitioners, auditors, project managers, accountants, solicitors and consultants who are increasingly finding cyber risk management is forming part of their remit or are expected to have an understanding of the subject. WHAT ARE THE BENEFITS? This comprehensive intense course provides transferable knowledge across any sector and lessons can be immediately applied. Understanding the landscape and being able to identify risks will assist in the development of a cyber risk management program. 4 P a g e w w w. p a u l c d w y e r. c o m

WHERE CAN I TAKE THE COURSE? The course is taught throughout Ireland, UK, USA, Middle East and in various other international locations through our partner network. HOW MUCH DOES IT COST AND HOW DO I REGISTER? All course fees, dates and online booking can be found on www.cyberrisktraining.com 5 P a g e w w w. p a u l c d w y e r. c o m

INSTRUCTOR BIOGRAPHY Paul C Dwyer is an internationally recognized information security expert with over two decades experience. A certified industry professional by the International Information Systems Security Certification Consortium (ISC2) and the Information System Audit & Control Association (ISACA) and recently selected for the IT Governance Expert Panel. Paul is the Chairman of NACSRO (National Association of Chief Security & Risk Officers), founder of The Irish Cyber Crime Task Force and Chief Advisor to the International Cyber Threat Task Force (ICTTF). Paul's credentials include: -Qualified Hacker -SOX (SAS70) Auditor -ISO 27001 Lead Auditor -BS25999 / BCM Expert -Forensic Investigator -PCI DSS Specialist -Prince2 -ISO 38500 Originally a network guru, Paul s career developed from IT Manager of a large legal firm to senior designer of the network operation centre s for EuroControl (Air Traffic) in Luxembourg and communication hubs for Chevron Oil in Kazakhstan and Moscow. He has worked and trained with such organizations as the US Secret Service, Scotland Yard, FBI, National Counter Terrorism Security Office (MI5), is approved by the National Crime Faculty and is a member of the High Tech Crime Network (HTCN). He has worked in across many sectors including: -Government Public Sector -Telecommunications -Pharmaceuticals -Financial 6 P a g e w w w. p a u l c d w y e r. c o m

Specialties -Cyber Crime & Cyber Warfare -IT GRC -Information & ICT Security -PCI Compliance -Financial Crime - Anti Fraud -Application Controls & Log Management -Business Continuity, Disaster Recovery & Incident Handling -Data Protection Legislation (International) -Digital Forensics & Investigations -Holistic Information Security Integration (ISMS) -Security Metrics & Analytics -Risk Assessments -SOX & 3rd Party Audits -Compliance Automation -Prince2 - Project Management A prolific contributor to the industry media and highly experienced public speaker, Paul acts an advisor to government bodies, law enforcement and fortune 500 companies around the globe. Paul was recently appointed as an advisor to NATO for a project dealing with military policy in relation to countering hybrid threats 7 P a g e w w w. p a u l c d w y e r. c o m

MORE INFO 8 P a g e w w w. p a u l c d w y e r. c o m