Course Detail(DGT050v : Steps to Develop an Effective Cyber Security Strategy (Live Webinar))

DGT050v : Steps to Develop an Effective Cyber Security Strategy (Live Webinar)

3.50 CPE Hours (Others)
Live Webinar


Programme Objective

The course content has been revised and duration has been reduced to 3.5 CPE Hour. This course is formally known as DGT002: Steps to Develop an Effective Cyber Security Strategy.

Cyber-security is an enterprise must, and cyber is a business risk rather than an IT problem. What is the likelihood that your organization will experience a substantial cyber event in the next 12 months? Is the risk greater than 50%? Less than 25%?

These questions are nowadays present on the minds of business owners, risk managers, and CFOs, who strive for practical and relevant answers.

This training outlines how organizations of all sizes can identify, treat/manage and transfer cyber risks, in alignment with your organization’s risk appetite and financial expectations. It gives attendees practical operational steps and processes to develop a cyber-security strategy based on a risk management process, followed by an action plan.

Traditionally, companies, for example financial entities have used qualitative frameworks — red, yellow, green, or high, medium, low — to characterize cyber threats. This approach can be quite useful, but it is no longer sufficient with a growing need to put numbers to cyber risk, calculating both severity and likelihood. A quantitative methodology is needed both to improve a company’s protection and to comply with increasingly stringent regulations.

The training helps optimizing business resources to mitigate cyber risks.

Programme Outline

  • Understand cyber-security meaning and impact: This section covers fundamental cyber-security notions. It describes cyber-security importance and negligence impact on business.
  • Understand the cyber risks for your business: This section describes the related risks for a business and gives a clear threats landscape.
  • Implement a strategy - The how to: This section lists the steps for a cyber-security strategy implementation, including assets, IP, staff and customers.
  • Define metrics to assess business cyber-maturity: This section defines cyber-maturity and describes associated metrics to monitor the strategy’s effectiveness.
  • Implement cyber-security good practices within the company: This section ends up with good cyber-security practices to protect the business on a daily basis.


Training Methodology

This interactive workshop includes lectures, activities and videos in order to provide learners the most adequate content. It will allow attendees to understand cyber-security through real case studies in the finance world.

Closing Date for Registration

1 week before programme or until full enrolment

Intended For

Business owners, CFOs, CTOs, Directors, Managers & IT Personnel

Competency Mapping

Others = 3.50 Hours

Schedule & Fees

Date & Time

11 Mar 2022 (2:00 PM - 5:30 PM)

Fee (inclusive of GST)

For Members: $ 199.02   $ 159.22
For Non-Members: $ 237.54   $ 190.03
Discount till 30 Jun 2022

Programme Facilitator(s)

Magda Chelly

Venue

Online Classroom in or outside of
Singapore

Date & Time

01 Dec 2021 (2:00 PM - 5:30 PM)

Registration is closed

Programme Facilitator(s)

Magda Chelly

Date & Time

26 Aug 2021 (9:30 AM - 1:00 PM)

Registration is closed

Programme Facilitator(s)

Magda Chelly

Date & Time

08 Oct 2020 (9:30 AM - 1:00 PM)

Registration is closed

Programme Facilitator(s)

Magda Chelly

Testimonial

Funding

No funding Available!

Programme Facilitator(s)


Magda Chelly

Magda Lilia Chelly, is the CISO and Managing Director of Responsible Cyber Pte. and a co-founder of Secucial Pte. Ltd. - a startup founded by Singtel Innov8 and NUS Entreprise. Magda is a CISO on demand for various companies, from medium size enterprises to Fortune 500 companies, where she helps the global and regional CISOs achieving their cyber security strategy effectively.
 
Magda has a strong experience in cyber security as well as international and business co-operations. Throughout her career, she has been working with governments and corporations to advise on how they react to the increasing international cyber threats. She is currently based in Singapore, with a global reach. She speaks five languages fluently and has a PhD in Telecommunication Engineering with a subsequent specialization in cyber security. She also was recently nominated as global leader of the year at the Women in IT Awards 2017, and TOP 50 cyber security influencer globally, TOP 30 women leaders in cyber security, as well as TOP 58 Women In Cyber Security to Follow on Twitter and TOP 20 Cyber Security Experts alongside with Kevin Mitnick.

 


Programme Objective

The course content has been revised and duration has been reduced to 3.5 CPE Hour. This course is formally known as DGT002: Steps to Develop an Effective Cyber Security Strategy.

Cyber-security is an enterprise must, and cyber is a business risk rather than an IT problem. What is the likelihood that your organization will experience a substantial cyber event in the next 12 months? Is the risk greater than 50%? Less than 25%?

These questions are nowadays present on the minds of business owners, risk managers, and CFOs, who strive for practical and relevant answers.

This training outlines how organizations of all sizes can identify, treat/manage and transfer cyber risks, in alignment with your organization’s risk appetite and financial expectations. It gives attendees practical operational steps and processes to develop a cyber-security strategy based on a risk management process, followed by an action plan.

Traditionally, companies, for example financial entities have used qualitative frameworks — red, yellow, green, or high, medium, low — to characterize cyber threats. This approach can be quite useful, but it is no longer sufficient with a growing need to put numbers to cyber risk, calculating both severity and likelihood. A quantitative methodology is needed both to improve a company’s protection and to comply with increasingly stringent regulations.

The training helps optimizing business resources to mitigate cyber risks.

Programme Outline

  • Understand cyber-security meaning and impact: This section covers fundamental cyber-security notions. It describes cyber-security importance and negligence impact on business.
  • Understand the cyber risks for your business: This section describes the related risks for a business and gives a clear threats landscape.
  • Implement a strategy - The how to: This section lists the steps for a cyber-security strategy implementation, including assets, IP, staff and customers.
  • Define metrics to assess business cyber-maturity: This section defines cyber-maturity and describes associated metrics to monitor the strategy’s effectiveness.
  • Implement cyber-security good practices within the company: This section ends up with good cyber-security practices to protect the business on a daily basis.


Training Methodology

This interactive workshop includes lectures, activities and videos in order to provide learners the most adequate content. It will allow attendees to understand cyber-security through real case studies in the finance world.

Closing Date for Registration

1 week before programme or until full enrolment

Intended For

Business owners, CFOs, CTOs, Directors, Managers & IT Personnel

Competency Mapping

Others = 3.50 Hours

Programme Facilitator(s)

Magda Chelly

Magda Lilia Chelly, is the CISO and Managing Director of Responsible Cyber Pte. and a co-founder of Secucial Pte. Ltd. - a startup founded by Singtel Innov8 and NUS Entreprise. Magda is a CISO on demand for various companies, from medium size enterprises to Fortune 500 companies, where she helps the global and regional CISOs achieving their cyber security strategy effectively.
 
Magda has a strong experience in cyber security as well as international and business co-operations. Throughout her career, she has been working with governments and corporations to advise on how they react to the increasing international cyber threats. She is currently based in Singapore, with a global reach. She speaks five languages fluently and has a PhD in Telecommunication Engineering with a subsequent specialization in cyber security. She also was recently nominated as global leader of the year at the Women in IT Awards 2017, and TOP 50 cyber security influencer globally, TOP 30 women leaders in cyber security, as well as TOP 58 Women In Cyber Security to Follow on Twitter and TOP 20 Cyber Security Experts alongside with Kevin Mitnick.

 

Upcoming Schedule

Date & Time

11 Mar 2022 (2:00 PM - 5:30 PM)

Fee (inclusive of GST)

For Members: $ 199.02   $ 159.22
For Non-Members: $ 237.54   $ 190.03
Discount till 30 Jun 2022

Programme Facilitator(s)

Magda Chelly

Venue

Online Classroom in or outside of
Singapore