: 2 Day
Face-to-Face Classroom and 2 Day Online
Instructor Led Workshop
: Online
workshop is delivered in two days, two units
each day between 9:00 am to 1 pm and 2:00 pm
to 5:30 pm
:
Comprehensive Student Guide and Workshop
Certificate
This
on-site course can also be conducted for customers
in Karachi, Lahore, and Islamabad
ABOUT THIS
WORKSHOP:
The risks that
come with cybersecurity can be overwhelming to
many organizations. Building a
robust cybersecurity program is often
complicated to conceptualize for any organization,
regardless of size. Yet, the cyber security
benefits of baselining to an industry-standard
guide are worth the restructuring that might be
involved. Frameworks are not a new concept to
cybersecurity professionals, and the benefits are
immense – nor do they need to be complicated to be
effective. In this two-day workshop, we will dive
into the benefits of the NIST Cybersecurity
Framework (CSF) and why it should be a
cornerstone for your cybersecurity solution.
This workshop is designed
based on the purpose to provide the insight into
the importance of developing Cybersecurity Risk
Management Framework mapping ISO 27001, NIST 2.0
CRF and COBIT frameworks followed by understanding
the key role ofISO 27032:2012, a guidelines for
Cybersecurity.
The
training course flow will be a mix of lectures &
classroom discussions so that participants can have
a detailed understanding of various components of
cybersecurity technologies.
After
completing this workshop, you will be able to:
Focus
on applying the NIST CSF 2.0 framework in
practical scenarios, integrating it with an
organization's broader risk management strategy.
Understand the
role of Enterprise Risk Management Framework.
Distinguish
system and application security threats and
vulnerabilities.
Know your risks
and the role of Enterprise Risk Management and
Controls.
Demystifying
Storage, Data Classification and subsequent
Categories and develop Information Security
Lifecycle Management strategy.
ISO/IEC
27032:2012 – Guidelines for Cybersecurity.
Perform
Qualitative Assessments using Simple and DREAD
techniques.
Practice
performing actual risk assessments within a
specific scope (e.g., a small business network or
a specific system) using the CSF's six
functions: Govern, Identify, Protect, Detect,
Respond, and Recover.
Develop and
integrate using ISO 27001, NIST 2.0 and COBIT
frameworks.
Create "Current
Profiles" (an organization's existing
cybersecurity posture) and "Target Profiles" (the
desired state). The next step involves performing
a gap analysis and creating a prioritized action
plan to bridge those gaps.
TARGETED
AUDIENCE:
CISO, CIO, CTO, IT Directors,
VP/IT Directors,
IT and Senior IT Managers, Business leaders, CSOC
Managers and Threat Hunters, Application Testers,
Risk and Compliance, Cybersecurity and Information
Security professionals, SOC Teams, Project
Managers, Network Security Engineers, Enterprise
Architects, Solution Architects and Technical
Writers.
This workshop is equally
recommended for IT Consultants, Systems Integrator
s, Technology Consultants, Sales and Technical
Sales resources who want to up-skill their present
set of knowledge field of Cybersecurity.
Fresh university graduates who
want to embark their career in the field of
cybersecurity and information security.
ABOUT THE
INSTRUCTOR
Training will be delivered by an
experienced trainer with 25+ years of career
experience imparting education and training services
both locally and internationally and have served
international enterprise technology vendors
including IBM, Fujitsu, and ICL.
Our
instructor holds various industry professional
certifications in the space of enterprise servers
and storage technologies, Information Security,
Enterprise Architecture, Blockchain, ITIL, Cloud,
Virtualization, Green IT, and a co-author of 10
IBM Redbooks and have designed and developed 70
plus courses based on storage, information
security, cybersecurity, enterprise architecture,
Blockchain, Open Banking Framework and digital
technologies stacks.
Workshop
Summary
In a nutshell, this
workshop shall increase the focus on cybersecurity to
protect sensitive data and systems. No organization,
regardless of size or industry, is immune to
cyber-attacks, and just one breach could cause
significant financial, reputational or regulatory
consequences. However, an effective control
environment can reduce the likelihood of a breach,
enhance incident detection and response, and
accelerate recovery efforts to limit damage.
Moreover, two criteria
can help determine the effectiveness of a data
security methodology. First, the cost of implementing
the system should be a small fraction of the value of
the protected data. Second, it should cost a potential
hacker more, in terms of money and/or time, to
compromise the system than the protected data is
worth.
PREREQUISITES:
Participants attending
this workshop should be familiar with basic
Information Technology (IT) and Security concepts,
business challenges and the role of general system
wide infrastructure technologies and their
applications.
COURSE
OUTLINE
Unit 1 – Risk
Assessment, Mitigation and Response
Planning
Differences
between Information Security and
Cybersecurity.
Multiple
layers of protection offered by
Cybersecurity.
What
are the Key Objectives and Goals of
Cybersecurity?
Mapping
of an Enterprise Risk Management (ERM)
framework to NIST Cybersecurity
Framework (CSF) 2.0.
Considerations
for Cybersecurity Risk Management.
Essential
Cybersecurity Templates.
ISO/IEC
27032:2012 – Guidelines for
Cybersecurity.
Unit
4 Assessment
Following are the customers who have
attended this workshop.
Group Photographs of students attended
our Cybersecurity Risk Management Framework
Workshops
State
Bank of Pakistan, AFMCO and House Building Finance
Company Ltd
has
attended a one day workshop on "Cybersecurity
Risk Management
Framework" on February 26, 2020.
EFU
Life, Expand Research (England), EETS, Interloop
Ltd, and Soneri
Bank Ltd
has attended a two day online workshop on "Cybersecurity
Risk Management Framework" on August 18 -
19, 2020.
MCB Bank
Ltd, Getz Pharma (Pvt) Ltd, IBM (Canada), Byco
Petroleum and
Mobilink
Microfinance Bank Ltd has attended a two day
online workshop on
"Cybersecurity
Risk Management Framework" on
September 29 - 30, 2020.
MCB
Islamic Bank, Emirates NBD Bank, Askari Bank,
Acuity Technologies,
and Daiwa
Capital Markets (England) has attended a two day
online
workshop
on “Cybersecurity Risk Management Framework”
on
November
3 - 4, 2020.
State
Bank of Pakistan, Telenor Microfinance Bank,
Emirates NBD Bank,
and EETS
has attended a two day online workshop on "Cybersecurity
Risk Management Framework" on March 18 - 19,
2021.
Bank
AL-Habib Ltd, U Microfinance Bank, Interloop Ltd,
SNGPL, Agriauto Industries Ltd, and Gul Ahmed has
attended a two-day online workshop on "Cybersecurity
Risk Management Framework" on November 10 -
11, 2021.