Course Detail(DGT002 : Steps to Develop an Effective Cyber Security Strategy)

UTAP Funding

DGT002 : Steps to Develop an Effective Cyber Security Strategy

7.00 CPE Hours (Others)
Classroom


Formerly known as “BF133: Steps to Develop an Effective Cyber Security Strategy”

Programme Objective
Cyber-security is an enterprise must. This training outlines how organizations of all sizes can identify and manage cyber security risks.

This training gives attendees practical operational steps and processes to develop a cyber-security strategy for their business with a detailed action plan. It discusses how to apply actions into policies for the development of a cyber security risk management process.

The training focuses on key features increasing the business’ ability to protect assets, intellectual property (IP), employees and customers. Drawing on experiences and real-life case scenarios, it helps understanding how to reduce business cyber risks.

Additionally, this course equips attendees with the capabilities to build a cyber-awareness culture within the business and raise employees’ awareness.
The training helps optimizing business resources to mitigate cyber risks.
 

Programme Outline

Topics covered include:

• Understand cyber-security meaning and impact: This section covers fundamental cyber-security notions. It describes cyber-security importance and negligence impact on business.
 
• Understand the cyber risks for your business: This section describes the related risks for a business and gives a clear threats landscape.
 
• Identify levels of responsibility: This section explains the roles and responsibilities of each department or role in a company.
 
• Implement a strategy - The how to: This section lists the steps for a cyber-security strategy implementation, including assets, IP, staff and customers.
 
• Define metrics to assess business cyber-maturity: This section defines cyber-maturity and describes associated metrics to monitor the strategy’s effectiveness.
 
• Understand the importance of a cyber-security culture and its meaning: This section elaborates the human factor for an effective strategy and defines the meaning of a cyber-security culture.
 
• Create cyber-awareness campaigns (Newsletters, posters, cyber-security days, etc.): This section teaches how to create a cyber-awareness campaign for a business.
 
• Implement cyber-security good practices within the company: This section ends up with good cyber-security practices to protect the business on a daily basis.

 
Training Methodology
This interactive workshop includes lectures, activities and videos in order to provide learners the most adequate content. It will allow attendees to understand cyber-security through real case studies in the finance world.
 
Closing Date for Registration
1 week before programme or until full enrolment
 

Intended For

Business owners, CFOs, CTOs, Directors, Managers & IT Personnel

Competency Mapping

Others = 7.00 Hours

Schedule & Fees

Date & Time

31 Jan 2020 (9:00 AM - 5:00 PM)

Registration is closed

Programme Facilitator(s)

Magda Chelly

Date & Time

13 Sep 2019 (9:00 AM - 5:00 PM)

Registration is closed

Programme Facilitator(s)

Magda Chelly

Date & Time

12 Apr 2019 (9:00 AM - 5:00 PM)

Registration is closed

Programme Facilitator(s)

Magda Chelly

Testimonial

Funding

1] NTUC Union Training Assistance Programme (UTAP)
UTAP (Union Training Assistance Programme) is an individual skills upgrading account for NTUC members. NTUC member gets to enjoy UTAP funding 50% of the unfunded course fee capped at $250 every year. This excludes miscellaneous fees such as GST and registration fee etc.
 
This course is approved for UTAP support for intakes conducted between 1 April 2020 – 31 March 2021.
 
As UTAP is given on calendar year basis, and calculated based on year of training taken, it cannot be accumulated.

  • Maintained paid-up NTUC membership before course, throughout course duration and at the point of claim and;
  • Course by training provider must be supported under UTAP and training must commence within the supported period and;
  • Unfunded course fee must not be fully sponsored by company or other types of funding
  • Unfunded course fee must be S$20.00 and above, and;
  • Member must achieve a minimum of 75% attendance for each application and sat for all prescribed examination(s), if any and;
  • UTAP application must be made within 6 months after course ends.

 
To submit for UTAP claims, please visit http://skillsupgrade.ntuc.org.sg/. Terms and conditions apply.
 
Should you have queries on the funding scheme, you can email to UTAP@e2i.com.sg or call NTUC Membership Hotline at 6213-8008.

Programme Facilitator(s)


Magda Chelly

Magda Lilia Chelly, is the CISO and Managing Director of Responsible Cyber Pte. and a co-founder of Secucial Pte. Ltd. - a startup founded by Singtel Innov8 and NUS Entreprise. Magda is a CISO on demand for various companies, from medium size enterprises to Fortune 500 companies, where she helps the global and regional CISOs achieving their cyber security strategy effectively.
 
Magda has a strong experience in cyber security as well as international and business co-operations. Throughout her career, she has been working with governments and corporations to advise on how they react to the increasing international cyber threats. She is currently based in Singapore, with a global reach. She speaks five languages fluently and has a PhD in Telecommunication Engineering with a subsequent specialization in cyber security. She also was recently nominated as global leader of the year at the Women in IT Awards 2017, and TOP 50 cyber security influencer globally, TOP 30 women leaders in cyber security, as well as TOP 58 Women In Cyber Security to Follow on Twitter and TOP 20 Cyber Security Experts alongside with Kevin Mitnick.

 


Formerly known as “BF133: Steps to Develop an Effective Cyber Security Strategy”

Programme Objective
Cyber-security is an enterprise must. This training outlines how organizations of all sizes can identify and manage cyber security risks.

This training gives attendees practical operational steps and processes to develop a cyber-security strategy for their business with a detailed action plan. It discusses how to apply actions into policies for the development of a cyber security risk management process.

The training focuses on key features increasing the business’ ability to protect assets, intellectual property (IP), employees and customers. Drawing on experiences and real-life case scenarios, it helps understanding how to reduce business cyber risks.

Additionally, this course equips attendees with the capabilities to build a cyber-awareness culture within the business and raise employees’ awareness.
The training helps optimizing business resources to mitigate cyber risks.
 

Programme Outline

Topics covered include:

• Understand cyber-security meaning and impact: This section covers fundamental cyber-security notions. It describes cyber-security importance and negligence impact on business.
 
• Understand the cyber risks for your business: This section describes the related risks for a business and gives a clear threats landscape.
 
• Identify levels of responsibility: This section explains the roles and responsibilities of each department or role in a company.
 
• Implement a strategy - The how to: This section lists the steps for a cyber-security strategy implementation, including assets, IP, staff and customers.
 
• Define metrics to assess business cyber-maturity: This section defines cyber-maturity and describes associated metrics to monitor the strategy’s effectiveness.
 
• Understand the importance of a cyber-security culture and its meaning: This section elaborates the human factor for an effective strategy and defines the meaning of a cyber-security culture.
 
• Create cyber-awareness campaigns (Newsletters, posters, cyber-security days, etc.): This section teaches how to create a cyber-awareness campaign for a business.
 
• Implement cyber-security good practices within the company: This section ends up with good cyber-security practices to protect the business on a daily basis.

 
Training Methodology
This interactive workshop includes lectures, activities and videos in order to provide learners the most adequate content. It will allow attendees to understand cyber-security through real case studies in the finance world.
 
Closing Date for Registration
1 week before programme or until full enrolment
 

Intended For

Business owners, CFOs, CTOs, Directors, Managers & IT Personnel

Competency Mapping

Others = 7.00 Hours

Programme Facilitator(s)

Magda Chelly

Magda Lilia Chelly, is the CISO and Managing Director of Responsible Cyber Pte. and a co-founder of Secucial Pte. Ltd. - a startup founded by Singtel Innov8 and NUS Entreprise. Magda is a CISO on demand for various companies, from medium size enterprises to Fortune 500 companies, where she helps the global and regional CISOs achieving their cyber security strategy effectively.
 
Magda has a strong experience in cyber security as well as international and business co-operations. Throughout her career, she has been working with governments and corporations to advise on how they react to the increasing international cyber threats. She is currently based in Singapore, with a global reach. She speaks five languages fluently and has a PhD in Telecommunication Engineering with a subsequent specialization in cyber security. She also was recently nominated as global leader of the year at the Women in IT Awards 2017, and TOP 50 cyber security influencer globally, TOP 30 women leaders in cyber security, as well as TOP 58 Women In Cyber Security to Follow on Twitter and TOP 20 Cyber Security Experts alongside with Kevin Mitnick.

 

Upcoming Schedule

Registration is closed

Date & Time

31 Jan 2020 (9:00 AM - 5:00 PM)

Fee (inclusive of GST)

For Members: $ 337.05
For Non-Members: $ 404.46

Programme Facilitator(s)

Magda Chelly

Venue

60 Cecil Street
ISCA House
Singapore 049709