Cyber Resilience 101
ABOUT
Our Cyber Resilience 101 Course is designed to equip you with cyber risk management knowledge and skills. In today's rapidly evolving digital landscape, staying ahead of cyber risks and ensuring your clients’ cyber resilience is crucial. This course is tailored to provide you with a solid foundation in cybersecurity principles and best practices.
Our expert instructors will guide you through engaging modules, interactive discussions, and real-world case studies to ensure a practical and immersive learning experience. A complete overview of the curriculum can be found below.
Instructors:
Travis Wong, Vice President of Customer Engagement and Cyber Resilience Coach, Resilience
Accreditation:
This course carries 8 CE credits and CPD.
WHEN
Tuesday, February 13 | Kansas City
9:00 AM - 5:00 PM | Programming (Lunch Included)
5:00 PM - 6:30 PM | Happy Hour
WHERE
Kansas City, Missouri
NEXT STEPS
You will receive an email confirmation once your spot is secured. Please contact, Ingrid Smith, Marketing Director, at ingridsmith@cyberresilience.com, with any questions.
ABOUT THE INSTRUCTOR
Travis Wong
Vice President of Customer Engagement & Cyber Resilience Coach at Resilience
Travis Wong is the Vice President of Customer Engagement at Resilience. Prior to joining Resilience in 2021, Wong served in cyber risk consultant capacities at CNA Insurance, Travelers and Liberty Mutual Insurance. Wong holds a BS in Bioengineering from the University of California, San Diego.
CYBER RESILIENCE 101 CURRICULUM OVERVIEW
Unit 1 | Introduction to Cyber Resilience (1 hr 25 mins)
- Introduce the concept and context of the Cyber Landscape, as well as how and why it is evolving
- Understand the concept of cyber security risks and visibility, as well as emerging technology and social-technical environments
Unit 2 | Understanding Cyber Attacks and the Threat Landscape ( 1 hr 35 mins)
- Understand the attacker’s methodology using the cyber kill chain
- Learn who the various threat actors are and their motivations, including their tactics, techniques, and procedures
- Learn how the dark web can be used to facilitate criminal activity
- Demonstrate methods used by a cybercriminal to exploit vulnerabilities
- Provide additional context around critical security controls and defense strategies
- Understand how to prepare for a cyber attack
Unit 3 | Cybersecurity Visibility and Actionable Hygiene (1 hr 25 mins)
- Understand the consequences of a data breach and how to prepare better
- Learn how and why information is critical to businesses
- Learn and exercise confidentiality, availability, integrity, and non-repudiation assistance in the protection of information assets
- Highlight the critical controls used to provide a layered approach to security-defense in depth
Unit 4 | Cyber Risk (30 mins)
- Understand Value at Risk - the potential losses you face from several perils
- Understand the function and process of risk assessment
- Assess the probability that a given peril materializes, and then evaluate the probability adjusted for your Value at Risk
- Understand the function and process of risk management
- Identify which controls are required to reduce the probability of events and assess their costs and ROI for implementing them without introducing additional moral hazard
- Understand the function and process of risk acceptance and transfer
- Clarify how much structured worry your organization is willing to tolerate and how much insurance you should be willing to purchase
- Understand how to present to the Board/Budgeting Committee/CFO
- Tell the money people what you need and why in economic terms
Unit 5 | Risk Transfer - Cyber Coverage and Claims (30 mins)
- Overview of first and third-party cyber coverage
- Understand the key components of driving capital efficiency
- Discuss recent cyber claims, lessons learned, and future trends
Unit 6 | Cyber Incident Simulation - Practice Makes Perfect (1 hr 15 mins)
- Validate your incident response plan before an incident and highlight the importance of proactive planning
- Highlight security gaps within policy, procedures, and guidelines
- Demonstrate that cyber is not just an IT risk and should be addressed as a business risk
- Deliver an understanding of how a cyber policy can assist in the response to an incident