Cyber Resilience 101

ABOUT
Our Cyber Resilience 101 Course is designed to equip you with cyber risk management knowledge and skills. In today's rapidly evolving digital landscape, staying ahead of cyber risks and ensuring your clients’ cyber resilience is crucial. This course is tailored to provide you with a solid foundation in cybersecurity principles and best practices.

Our expert instructors will guide you through engaging modules, interactive discussions, and real-world case studies to ensure a practical and immersive learning experience. A complete overview of the curriculum can be found below. 

Instructors:
Travis Wong, Vice President of Customer Engagement and Cyber Resilience Coach, Resilience

Accreditation:
This course carries 8 CE credits and CPD.

WHEN

Tuesday, February 13 | Kansas City

9:00 AM - 5:00 PM | Programming (Lunch Included)
5:00 PM - 6:30 PM | Happy Hour

WHERE

Kansas City, Missouri

NEXT STEPS
You will receive an email confirmation once your spot is secured. Please contact, Ingrid Smith, Marketing Director, at ingridsmith@cyberresilience.com, with any questions. 

ABOUT THE INSTRUCTOR

Travis Wong Headshot


Travis Wong
Vice President of Customer Engagement & Cyber Resilience Coach at Resilience

Travis Wong is the Vice President of Customer Engagement at Resilience. Prior to joining Resilience in 2021, Wong served in cyber risk consultant capacities at CNA Insurance, Travelers and Liberty Mutual Insurance. Wong holds a BS in Bioengineering from the University of California, San Diego.

CYBER RESILIENCE 101 CURRICULUM OVERVIEW

Unit 1 | Introduction to Cyber Resilience (1 hr 25 mins)

  • Introduce the concept and context of the Cyber Landscape, as well as how and why it is evolving
  • Understand the concept of cyber security risks and visibility, as well as emerging technology and social-technical environments

Unit 2 | Understanding Cyber Attacks and the Threat Landscape ( 1 hr 35 mins)     

  • Understand the attacker’s methodology using the cyber kill chain
  • Learn who the various threat actors are and their motivations, including their tactics, techniques, and procedures
  • Learn how the dark web can be used to facilitate criminal activity
  • Demonstrate methods used by a cybercriminal to exploit vulnerabilities
  • Provide additional context around critical security controls and defense strategies
  • Understand how to prepare for a cyber attack

Unit 3 | Cybersecurity Visibility and Actionable Hygiene (1 hr 25 mins)

  • Understand the consequences of a data breach and how to prepare better
  • Learn how and why information is critical to businesses
  • Learn and exercise confidentiality, availability, integrity, and non-repudiation assistance in the protection of information assets
  • Highlight the critical controls used to provide a layered approach to security-defense in depth

Unit 4 | Cyber Risk  (30 mins)

  • Understand Value at Risk - the potential losses you face from several perils
  • Understand the function and process of risk assessment
    • Assess the probability that a given peril materializes, and then evaluate the probability adjusted for your Value at Risk
  • Understand the function and process of risk management 
    • Identify which controls are required to reduce the probability of events and assess their costs and ROI for implementing them without introducing additional moral hazard
  • Understand the function and process of risk acceptance and transfer
    • Clarify how much structured worry your organization is willing to tolerate and how much insurance you should be willing to purchase
  • Understand how to present to the Board/Budgeting Committee/CFO
    • Tell the money people what you need and why in economic terms

Unit 5 | Risk Transfer - Cyber Coverage and Claims (30 mins)

  • Overview of first and third-party cyber coverage
  • Understand the key components of driving capital efficiency
  • Discuss recent cyber claims, lessons learned, and future trends

Unit 6 | Cyber Incident Simulation - Practice Makes Perfect (1 hr 15 mins)

  • Validate your incident response plan before an incident and highlight the importance of proactive planning
  • Highlight security gaps within policy, procedures, and guidelines 
  • Demonstrate that cyber is not just an IT risk and should be addressed as a business risk
  • Deliver an understanding of how a cyber policy can assist in the response to an incident
DISCLAIMER
By attending this event or program, whether remote or in person, you are entering an area where photography, audio and video recording may occur. Your entry and presence on the event premises constitutes your consent to be photographed, filmed, and/or otherwise recorded and to the release, publication, exhibition, or reproduction of any and all recorded media of your appearance, voice, and name for any purpose whatsoever in perpetuity in connection with Arceo Labs, Inc. d/b/a Resilience and its affiliates and subsidiaries (collectively referred to as “Resilience”), and its initiatives, including, by way of example only, use on websites, in social media, news and advertising.

By entering the event premises, or by joining the event remotely, you waive and release any claims you may have related to the use of recorded media of you at the event, including, without limitation, any right to inspect or approve the photo, video or audio recording of you, any claims for invasion of privacy, violation of the right of publicity, defamation, and copyright infringement or for any fees for use of such recorded media. You understand that all photography, filming and/or recording will be done in reliance on this consent. If you do not agree to the foregoing, please notify MaryKate Broderick, marykatebroderick@cyberresilience.com.

This programming is intended solely for informational purposes. The views and opinions expressed as part of this programming do not necessarily state or reflect those of Resilience.  It is not intended, nor can it be relied upon, to create any rights enforceable by any party in litigation with Resilience or to endorse the use of products or services provided by specific vendors. With respect to this programming, neither Resilience nor any of its employees, makes any warranty, express or implied, including the warranties of merchantability and fitness for a particular purpose, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. This material is not intended as a solicitation for insurance purchase.