Comprehensive Student Guide and Workshop
on-site couse can also be conducted for customers in
Lahore, and Islamabad
The risks that
come with cybersecurity can be overwhelming to
many organizations. Building a
robust cybersecurity program is often
complicated to conceptualize for any organization,
regardless of size. Yet, the cyber security
benefits of baselining to an industry-standard
guide are worth the restructuring that might be
involved. Frameworks are not a new concept to
cybersecurity professionals, and the benefits are
immense nor do they need to be complicated to be
effective. In this two-day workshop, we will dive
into the benefits of the NIST Cybersecurity
Framework (CSF) and why it should be a
cornerstone for your cybersecurity solution.
This workshop is designed
based on the purpose to provide the insight into
the importance of developing Cybersecurity Risk
Management Framework mapping ISO 27001, NIST 1.1
CRF and COBIT frameworks followed by understanding
the key role ofISO 27032:2012, a guidelines for
training course flow will be a mix of lectures &
classroom discussions so that participants can have
a detailed understanding of various components of
completing this workshop, you will be able to:
Understand Generalize Security
Framework Traditional to Enterprise Security in
Understand basic cybersecurity
concepts and learn how to develop a Threat
Management strategy covering internal and external
Understand Threat Modeling and learn
how to perform a exercise based on Threat
Distinguish system and application
security threats and vulnerabilities.
Know your risks and the role of
Enterprise Risk Management.
Demystifying Storage, Data
Classification and subsequent Categories and
develop Information Security Lifecycle Management
ISO/IEC 27032:2012 Guidelines for
Learn how to perform Qualitative
Assessments using Simple and DREAD techniques.
Understand how to develop and
integrate using ISO 27001, NIST 1.1 and COBIT
Know what Risk Management tool will
work best for you.
CISO, CIO, CTO, IT Directors,
IT and Senior IT Managers, Business leaders, CSOC
Managers and Threat Hunters, Application Testers,
Risk and Compliance, Cybersecurity and Information
Security professionals, SOC Teams, Project
Managers, Network Security Engineers, Enterprise
Architects, and Technical Writers.
This workshop is equally
recommended for IT Consultants, Systems Integrator
s, Technology Consultants, Sales and Technical
Sales resources who want to up-skill their present
set of knowledge field of Cybersecurity.
Fresh university graduates who
want to embark their career in the field of
cybersecurity and information security.
Training will be delivered by an
experienced trainer with 25+ years of career
experience imparting education and training services
both locally and internationally and have served
international enterprise technology vendors
including IBM, Fujitsu, and ICL.
instructor holds various industry professional
certifications in the space of enterprise servers
and storage technologies, Information Security,
Enterprise Architecture, Blockchain, ITIL, Cloud,
Virtualization, Green IT, and a co-author of 10
IBM Redbooks and have designed and developed 70
plus courses based on storage, information
security, cybersecurity, enterprise architecture,
Blockchain, Open Banking Framework and digital
In a nutshell, this
workshop shall increase the focus on cybersecurity to
protect sensitive data and systems. No organization,
regardless of size or industry, is immune to
cyber-attacks, and just one breach could cause
significant financial, reputational or regulatory
consequences. However, an effective control
environment can reduce the likelihood of a breach,
enhance incident detection and response, and
accelerate recovery efforts to limit damage.
Moreover, two criteria
can help determine the effectiveness of a data
security methodology. First, the cost of implementing
the system should be a small fraction of the value of
the protected data. Second, it should cost a potential
hacker more, in terms of money and/or time, to
compromise the system than the protected data is
this workshop should be familiar with basic
Information Technology (IT) and Security concepts,
business challenges and the role of general system
wide infrastructure technologies and their
Cybersecurity and Unified Threat
and Cyberspace Defined.
between Information Security and
layers of protection offered by
Strategy and Strategic Planning.
and implement system up-time
security challenges faced today.
Why do we
need to make cybersecurity a
Categories Network, Host, and
to protect your data against Insider
Attacker Profiles Resources and
Hunting and Threat Management
hunting Understand and
differentiate between IoAs ) and
Threat Management, security threats
and their channels.
Progression Model used by
Vector, Attack Surface, Malicious
Actors and Risk Categories.
Threat Modeling and how to perform
threat modeling exercise.
requirement for having an effective
Threat Hunting program.
Threat Hunting Maturity Model.
Unified Threat Management and
understand how UTM works?
Threat Management vs.
Next-Generation Firewalls A smart
How to avoid
the catch Unified Threat
Management or Next Generation
& Disadvantages of UTM and
Threat Management Strategy.
the NIST Cybersecurity Framework using
of NIST and COBIT.
key attributes & Examples of
Framework Industry Resources.
27032:2012 Guidelines for
Unit 4 Assessment
Following are the customers who have
attended this workshop.
Group Photographs of students attended
our Cybersecurity Risk Management Framework
Bank of Pakistan, AFMCO and House Building Finance
attended a one day workshop on "Cybersecurity
Framework" on February 26, 2020.
Life, Expand Research (England), EETS, Interloop
Ltd, and Soneri
has attended a two day online workshop on "Cybersecurity
Risk Management Framework" on August 18 -
Ltd, Getz Pharma (Pvt) Ltd, IBM (Canada), Byco
Microfinance Bank Ltd has attended a two day
online workshop on
Risk Management Framework" on
September 29 - 30, 2020.
Islamic Bank, Emirates NBD Bank, Askari Bank,
Capital Markets (England) has attended a two day
on Cybersecurity Risk Management Framework
3 - 4, 2020.
Bank of Pakistan, Telenor Microfinance Bank,
Emirates NBD Bank,
has attended a two day online workshop on "Cybersecurity
Risk Management Framework" on March 18 - 19,
AL-Habib Ltd, U Microfinance Bank, Interloop Ltd,
SNGPL, Agriauto Industries Ltd, and Gul Ahmed has
attended a two-day online workshop on "Cybersecurity
Risk Management Framework" on November 10 -