For more information about CSM-ACE 2019, please contact: 
  • |
  • +603 8800 7999

CSM-ACE Cyber Security Risk Management for C-Suite

Date 26 September 2019
Time 8.30 am - 5.00 pm
Venue Royale Chulan, Kuala Lumpur, Malaysia
Fee RM2,000.00 (Fees exclude 6% SST)
Level Fundamental

This course prepares board members and senior management to assess and take a proactive measure in cyber security.

Participants are exposed to investigate risk assessment and management frameworks to mitigate risks and identify potential security gaps that could prove a liability.

It is crucial for board members to address the threats from Social Engineering and Advanced Persistent Threats that can decimate an organization.

  • Assess the responsibilities of the board for corporate cyber security.
  • Determine a proper security posture for your organization.
  • Identify gaps in coverage and countermeasures.
  • Prepare for advanced persistent threats and social engineering attacks.
  • Cyber security risk assessment and management for the Boardroom and C-Suite.
  • C-Level
  • Senior Management
  • IT Security Practitioner
  • IT Personnel
  1. Introduction
    • Defining areas of concern
    • Assessing the stakes of cyber security

  2. Examining the Impact of Cyber Security Breaches
    • Identifying sources of cyber security risk
    • Analyzing breaches and their costs
    • Categorizing threats
    • Assessing your cyber security posture
    • Measuring and meeting cyber security objectives
    • Complying with regulatory requirements

  3. Investigating Risk Frameworks
    • Deploying risk frameworks
    • Selecting the best risk management for your organization

  4. Identifying Security Gaps
    • Inspecting the causes of excessive residual risk
    • Removing factors that increase risk
    • Minimizing residual risk

  5. Handling Residual Threats and Risk
    • Examining security metrics to deal with risk
    • Comprehending regulatory requirements
    • Identifying causes of failed security

  6. Exploring Today's Greatest Threats
    • Discovering the advanced persistent threat
    • Managing the threat of social engineering
    • Protecting sensitive and targeted assets

  7. Defending Against Technical Breaches of Organizational Security
    • Discussing significant breaches as a case study
    • Reviewing lessons learned from recent attacks

  8. Developing Personnel Security to Resist Social Engineering
    • Addressing the issue of human vulnerability
    • Analyzing historic failures of OPSEC and breaches

  9. Preventing the Hybrid Advanced Persistent Threat Attacks
    • Exploring how these attacks work
    • Identifying remediation and preventative measures

  10. Summarizing the Role of the Board in Cyber Security
    • Being aware of the most serious threats
    • Ensuring that the proper focus is placed upon known issues and threats
  • 2 x tea break and 1 lunch for 1 day training