sp
Course Title : Cybersecurity Risk Management Framework - CSF 2.0
Course Duration : 2 Day Face-to-Face Classroom and 2 Day Online Instructor Led Workshop
Online workshop is delivered in two days, two units each day between 9:00 am to 1 pm and 2:00 pm to 5:30 pm
Course Fee : Available upon request (Write to us at info@tlcpak.com)
Course Location  : TLC Office, Customer Onsite, and Online 
Course Code : TN227
Deliverables : Comprehensive Student Guide and Workshop Certificate

This on-site course can also be conducted for customers in Karachi, Lahore, and Islamabad
dn
ABOUT THIS WORKSHOP: 

The risks that come with cybersecurity can be overwhelming to many organizations. Building a robust cybersecurity program is often complicated to conceptualize for any organization, regardless of size. Yet, the cyber security benefits of baselining to an industry-standard guide are worth the restructuring that might be involved. Frameworks are not a new concept to cybersecurity professionals, and the benefits are immense – nor do they need to be complicated to be effective. In this two-day workshop, we will dive into the benefits of the NIST Cybersecurity Framework (CSF) and why it should be a cornerstone for your cybersecurity solution. 

This workshop is designed based on the purpose to provide the insight into the importance of developing Cybersecurity Risk Management Framework mapping ISO 27001, NIST 2.0 CRF and COBIT frameworks followed by understanding the key role of  ISO 27032:2012, a guidelines for Cybersecurity.  

The training course flow will be a mix of lectures & classroom discussions so that participants can have a detailed understanding of various components of cybersecurity technologies.

After completing this workshop, you will be able to:

  • Focus on applying the NIST CSF 2.0 framework in practical scenarios, integrating it with an organization's broader risk management strategy.
  • Understand the role of Enterprise Risk Management Framework.
  • Distinguish system and application security threats and vulnerabilities.
  • Know your risks and the role of Enterprise Risk Management and Controls.
  • Demystifying Storage, Data Classification and subsequent Categories and develop Information Security Lifecycle Management strategy.
  • ISO/IEC 27032:2012 – Guidelines for Cybersecurity.
  • Perform Qualitative Assessments using Simple and DREAD techniques.
  • Practice performing actual risk assessments within a specific scope (e.g., a small business network or a specific system) using the CSF's six functions: Govern, Identify, Protect, Detect, Respond, and Recover.
  • Develop and integrate using ISO 27001, NIST 2.0 and COBIT frameworks.
  • Create "Current Profiles" (an organization's existing cybersecurity posture) and "Target Profiles" (the desired state). The next step involves performing a gap analysis and creating a prioritized action plan to bridge those gaps.

TARGETED AUDIENCE:
  • CISO, CIO, CTO, IT Directors, VP/IT Directors, IT and Senior IT Managers, Business leaders, CSOC Managers and Threat Hunters, Application Testers, Risk and Compliance, Cybersecurity and Information Security professionals, SOC Teams, Project Managers, Network Security Engineers, Enterprise Architects, Solution Architects and Technical Writers.
  • This workshop is equally recommended for IT Consultants, Systems Integrator s, Technology Consultants, Sales and Technical Sales resources who want to up-skill their present set of knowledge field of Cybersecurity.
  • Fresh university graduates who want to embark their career in the field of cybersecurity and information security.

ABOUT THE INSTRUCTOR

Training will be delivered by an experienced trainer with 25+ years of career experience imparting education and training services both locally and internationally and have served international enterprise technology vendors including IBM, Fujitsu, and ICL.

Our instructor holds various industry professional certifications in the space of enterprise servers and storage technologies, Information Security, Enterprise Architecture, Blockchain, ITIL, Cloud, Virtualization, Green IT, and a co-author of 10 IBM Redbooks and have designed and developed 70 plus courses based on storage, information security, cybersecurity, enterprise architecture, Blockchain, Open Banking Framework and digital technologies stacks.    

Workshop Summary
In a nutshell, this workshop shall increase the focus on cybersecurity to protect sensitive data and systems. No organization, regardless of size or industry, is immune to cyber-attacks, and just one breach could cause significant financial, reputational or regulatory consequences. However, an effective control environment can reduce the likelihood of a breach, enhance incident detection and response, and accelerate recovery efforts to limit damage.

Moreover, two criteria can help determine the effectiveness of a data security methodology. First, the cost of implementing the system should be a small fraction of the value of the protected data. Second, it should cost a potential hacker more, in terms of money and/or time, to compromise the system than the protected data is worth.

PREREQUISITES:
Participants attending this workshop should be familiar with basic Information Technology (IT) and Security concepts, business challenges and the role of general system wide infrastructure technologies and their applications. 

COURSE OUTLINE 

Unit 1 – Risk Assessment, Mitigation and Response Planning

  • Differences between Information Security and Cybersecurity.
  • Multiple layers of protection offered by Cybersecurity.
  • What are the Key Objectives and Goals of Cybersecurity?
  • Foundational steps to Implement Cybersecurity.
  • Threat Categories – Network-based, Host-based, & Application-based Threats.
  • OSI Layers and Attacks types.
  • Understanding Risk and its impact on Cybersecurity.
  • Key Steps in Identifying Critical Assets – Example of Critical Assets.
  • Risk Sources and Threat Actors – Changing Attacker Profiles.
  • Knowing security threats and their channels.
  • Attack Progression Model used by Cybercriminals – An Illustration.
  • Maintaining a Cybersecurity Asset Inventories.
  • A layered Cyber Defense Approach – The bigger picture.
  • The importance of Risk Assessment in Cybersecurity.
  • Vulnerability Assessment (vulnerability Analysis).
  • Types of Comprehensive Vulnerability Assessments.
  • Qualitative and Quantitative Risk Assessment.
  • How to perform a Qualitative Risk Analysis using DREAD Model – Activity.
  • Elements of Risks – The Big Picture.
  • Understand Risk Register – A Four Step Process.
  • What Data and Information should go into a Risk Register?
  • Risk Scoring – Business Impact.
  • Risk Mitigation and Response Planning.
  • Developing and Implementing Cybersecurity Controls.
  • Understand Incident Response Planning.
  • Seven Key Phases of an Incident Response Plan.
  • Cyber Management Process and Cyber Incident Management Framework.
  • Cybersecurity Controls and Compliance Mapping.
  • The Challenge of Control Mapping and Control Mapping Process.
  • Risk Monitoring, Reporting and Governance.
  • Unit 1 Assessment.

Unit 2 – Understanding the Role of Enterprise Risk Management 
  • Enterprise Risk Management Defined.
  • Why Data Protection is important.
  • To address security threats, leaders must avoid common myths.
  • Three categories of Risks – Business Resilience and Cyber Resilience.
  • The Three Lines of Defense Model for Risk Management.
  • Understanding Risk Management Framework, Role and Workflow.
  • Risk Management: Know your risks and the role of Enterprise Risk Management.
  • Know your Storage Risks and than Plan.
  • Essential practices required to effectively manage risks.
  • Defense Planning – Risk Analysis and Assessments.
  • Risk Management Approach, key objectives and benefits.
  • 10 essential practices required to effectively manage risk.
  • Risk Management Approach, Key Objectives and Risk Management Plan template.
  • About ISO 27001 and Key changes in the ISO 27001 2022 revision.
  • What are the key objectives of using standard?
  • Updated attribute categories for security controls.
  • Risk Treatment Plan – An essential part of Risk Assessment Program.
  • Key steps to an Effective Risk Assessment using ISO 27001.
  • Major steps to ISMS Implementation.
  • Automating the Enterprise Risk Management Process.
  • General issues that needs attention from Storage Security POV.
  • Criteria can help determine the effectiveness of a storage security.
  • Key recommendations for developing an Enterprise Risk Management strategy and framework targeting cybersecurity.
  • Vulnerability Assessment and vulnerabilities that organizations cannot ignore.
  • Performing Qualitative Risk Assessment using Simple and DREAD techniques.
  • Top 10 recommendations for closing the security gap.
  • Unit 2 Assessment .

Unit 3 – Information Security Lifecycle Management Strategy
  • What is Strategy and Strategic Planning?
  • Generalize Security Framework – Traditional to Enterprise Security in a View.
  • Top 10 Cybersecurity Trends to Watch in 2026.
  • Common Storage silos – The Bigger Challenge.
  • Understanding why Data Management is important?
  • Why do we build Operational Security Controls & Capabilities?
  • The Data-driven Enterprise and its Challenges.
  • Questions that you should ask as a part of Data Collection & Analysis exercise.
  • Five ways to Optimize Data Strategy.
  • 14 important information about Data Storage Management.
  • Understand Life Cycle Management and Information Security?
  • The Information Security Lifecycle Management Program.
  • Information Security Lifecycle Model.
  • Understanding Data Lifecycle Management – DLM.
  • Storage Vs Data Classification.
  • Information Lifecycle Management – ILM.
  • Exploiting types of ILM Data Storage Strategies.
  • Understanding the difference between ILM and DLM.
  • Information Lifecycle Management Example.
  • Difference between ILM and DLM – Summary.
  • Consequences for not following security management lifecycle.
  • Unit Assessment 3.


Unit 4 – Principal Guidelines for Developing Cybersecurity Risk Framework

  • Understand Cybersecurity Principles and Cybersecurity Laws.
  • Specific business goals for implementing cybersecurity.
  • Steps for creating a Cybersecurity Risk Management Strategy.
  • Principal Guidelines for Developing Cybersecurity Risk Management Framework.
  • Principles of Cybersecurity Laws and Advanced Cybersecurity Solutions.
  • Understand Cybersecurity Framework – NIST 1.1 Vs. NIST 2.0.
  • Cybersecurity Framework implementation approach.
  • Recommended Steps for the Implementation of CRMF.
  • Key Roles of NIST 2.0 Core Functions.
  • Framework Development, Framework Components and Framework Profiles.
  • CIST Cybersecurity Framework Implementation Tiers – Framework Structure.
  • Integrating NIST 2.0, ISMS 27001 and COBIT.
  • Mapping of an Enterprise Risk Management (ERM) framework to NIST Cybersecurity Framework (CSF) 2.0.
  • Considerations for Cybersecurity Risk Management.
  • Essential Cybersecurity Templates.
  • ISO/IEC 27032:2012 – Guidelines for Cybersecurity.
  • Unit 4 Assessment
 csf2


 
 

 

Following are the customers who have attended this workshop.


 


 

mib_logo
 
 

 

 
Group Photographs of students attended our Cybersecurity Risk Management Framework Workshops

 

State Bank of Pakistan, AFMCO and House Building Finance Company Ltd 
has attended a one day workshop on "Cybersecurity Risk 
Management Framework" on February 26, 2020. 

EFU Life, Expand Research (England), EETS, Interloop Ltd, and Soneri 
Bank Ltd has attended a two day online workshop on "Cybersecurity Risk Management Framework" on August 18 - 19, 2020. 

MCB Bank Ltd, Getz Pharma (Pvt) Ltd, IBM (Canada), Byco Petroleum and
Mobilink Microfinance Bank Ltd has attended a two day online workshop on
"Cybersecurity Risk Management Framework" on  September 29 - 30, 2020. 


 

MCB Islamic Bank, Emirates NBD Bank, Askari Bank, Acuity Technologies, 
and Daiwa Capital Markets (England) has attended a two day online 
workshop on “Cybersecurity Risk Management Framework” on 
November 3 - 4, 2020. 

State Bank of Pakistan, Telenor Microfinance Bank, Emirates NBD Bank, 
and EETS has attended a two day online workshop on "Cybersecurity Risk Management Framework" on March 18 - 19, 2021. 

tn227-6

Bank AL-Habib Ltd, U Microfinance Bank, Interloop Ltd, SNGPL, Agriauto Industries Ltd, and Gul Ahmed has attended a two-day online workshop on "Cybersecurity Risk Management Framework" on November 10 - 11, 2021. 


 
 
 
List of IBM AIX Operating System 
Standard Courses

AIX 7 Basics

Power Systems for AIX II - AIX Systems Administration

Power Systems for AIX III - Advanced Administration and Problem Determination

Introduction to AIX Korn Shell Scripting - AIX 7,1, AIX 6.1, AIX 5.3 and Linux

AIX 7 Jumpstart for UNIX Professionals

Security for Power Systems AIX

IBM POWER Virtualization Technologies

AIX Disk Storage Management and Recovery Procedures

AIX Performance Monitoring and Management

Introduction to IT Infrastructure Technologies

Understanding the Role of Storage Technologies and Big Data

Linux Basics for Users

 

List of IBM AIX Operating System 
Short-Term Courses

AIX System Configuration Devices & AIX System Storage Overview

AIX Disk Storage Management & Recovery Procedures

AIX Performance Monitoring & Management

Understanding & Managing AIX ODM (Object Data Manager)

Security for Power Systems AIX

AIX Software Installation Maintenance & Backup & Restotore

Working with Logical Volume Manager & File System Administration

AIX Error Monitoring & System Dump Facility & AIX Scheduling

AIX Security & User Administration