Course Detail()

UTAP Funding

3.50 CPE Hours (Category 1, Category 2, Category 3, Category 4, Others)
Live Webinar


Programme Objective

The course content has been revised and duration has been reduced to 3.5 CPE Hour. This course is formally known as DGT002: Steps to Develop an Effective Cyber Security Strategy.

Cyber-security is an enterprise must, and cyber is a business risk rather than an IT problem. What is the likelihood that your organization will experience a substantial cyber event in the next 12 months? Is the risk greater than 50%? Less than 25%?

These questions are nowadays present on the minds of business owners, risk managers, and CFOs, who strive for practical and relevant answers.

This training outlines how organizations of all sizes can identify, treat/manage and transfer cyber risks, in alignment with your organization’s risk appetite and financial expectations. It gives attendees practical operational steps and processes to develop a cyber-security strategy based on a risk management process, followed by an action plan.

Traditionally, companies, for example financial entities have used qualitative frameworks — red, yellow, green, or high, medium, low — to characterize cyber threats. This approach can be quite useful, but it is no longer sufficient with a growing need to put numbers to cyber risk, calculating both severity and likelihood. A quantitative methodology is needed both to improve a company’s protection and to comply with increasingly stringent regulations.

The training helps optimizing business resources to mitigate cyber risks.

Programme Outline

  • Understand cyber-security meaning and impact: This section covers fundamental cyber-security notions. It describes cyber-security importance and negligence impact on business.
  • Understand the cyber risks for your business: This section describes the related risks for a business and gives a clear threats landscape.
  • Implement a strategy - The how to: This section lists the steps for a cyber-security strategy implementation, including assets, IP, staff and customers.
  • Define metrics to assess business cyber-maturity: This section defines cyber-maturity and describes associated metrics to monitor the strategy’s effectiveness.
  • Implement cyber-security good practices within the company: This section ends up with good cyber-security practices to protect the business on a daily basis.


Training Methodology

This interactive workshop includes lectures, activities and videos in order to provide learners the most adequate content. It will allow attendees to understand cyber-security through real case studies in the finance world.

Closing Date for Registration

1 week before programme or until full enrolment

Intended For

Business owners, CFOs, CTOs, Directors, Managers & IT Personnel

Schedule & Fees

Testimonial

Funding

1] NTUC Union Training Assistance Programme (UTAP)
 

UTAP (Union Training Assistance Programme) is an individual skills upgrading account for NTUC members.
 
To find out more on the UTAP funding and support validity period please click here.
 
Should you have queries on the funding scheme, you can email to UTAP@e2i.com.sg or call NTUC Membership Hotline at 6213-8008

Programme Facilitator(s)


Programme Objective

The course content has been revised and duration has been reduced to 3.5 CPE Hour. This course is formally known as DGT002: Steps to Develop an Effective Cyber Security Strategy.

Cyber-security is an enterprise must, and cyber is a business risk rather than an IT problem. What is the likelihood that your organization will experience a substantial cyber event in the next 12 months? Is the risk greater than 50%? Less than 25%?

These questions are nowadays present on the minds of business owners, risk managers, and CFOs, who strive for practical and relevant answers.

This training outlines how organizations of all sizes can identify, treat/manage and transfer cyber risks, in alignment with your organization’s risk appetite and financial expectations. It gives attendees practical operational steps and processes to develop a cyber-security strategy based on a risk management process, followed by an action plan.

Traditionally, companies, for example financial entities have used qualitative frameworks — red, yellow, green, or high, medium, low — to characterize cyber threats. This approach can be quite useful, but it is no longer sufficient with a growing need to put numbers to cyber risk, calculating both severity and likelihood. A quantitative methodology is needed both to improve a company’s protection and to comply with increasingly stringent regulations.

The training helps optimizing business resources to mitigate cyber risks.

Programme Outline

  • Understand cyber-security meaning and impact: This section covers fundamental cyber-security notions. It describes cyber-security importance and negligence impact on business.
  • Understand the cyber risks for your business: This section describes the related risks for a business and gives a clear threats landscape.
  • Implement a strategy - The how to: This section lists the steps for a cyber-security strategy implementation, including assets, IP, staff and customers.
  • Define metrics to assess business cyber-maturity: This section defines cyber-maturity and describes associated metrics to monitor the strategy’s effectiveness.
  • Implement cyber-security good practices within the company: This section ends up with good cyber-security practices to protect the business on a daily basis.


Training Methodology

This interactive workshop includes lectures, activities and videos in order to provide learners the most adequate content. It will allow attendees to understand cyber-security through real case studies in the finance world.

Closing Date for Registration

1 week before programme or until full enrolment

Intended For

Business owners, CFOs, CTOs, Directors, Managers & IT Personnel

Programme Facilitator(s)


No course instances or course instance sessions available.