Cyber Resilience 101

ABOUT
Our Cyber Resilience 101 Course is designed to equip you with cyber risk management knowledge and skills. In today's rapidly evolving digital landscape, staying ahead of cyber risks and ensuring your clients’ cyber resilience is crucial. This course is tailored to provide you with a solid foundation in cybersecurity principles and best practices. A complete overview of the curriculum can be found below. 

Our expert instructors will guide you through engaging modules, interactive discussions, and real-world case studies to ensure a practical and immersive learning experience.

Instructors:
Si West, Cyber Resilience Coach & Director of Customer Engagement at Resilience

Accreditation:
This course is NCSC assured and carries 7 CE credits and CPD

WHEN

Wednesday, November 29

9:00 AM - 5:00 PM | Programming (Lunch Included)
5:00 PM - 6:30 PM | Happy Hour

WHERE
London

NEXT STEPS
You will receive an email confirmation once your spot is secured. Please contact, Ingrid Smith, Marketing Director, at ingridsmith@cyberresilience.com, with any questions. 

ABOUT THE INSTRUCTOR

Si West


Si West
Cyber Resilience Coach & Director of Customer Engagement at Resilience

Si West has more than 25 years of global security risk management experience across government, military, and civil agencies. He is a National Cyber Security Centre (NCSC) certified instructor leading training for global underwriting teams on complex risk issues. West served over 14 years in the Royal Marines and has an MSc in Cyber Security and Human Factors from Bournemouth University.

CYBER RESILIENCE 101 CURRICULUM OVERVIEW

Unit 1 | Introduction to Cyber Resilience (1 hr 25 mins)

  • Introduce the concept and context of the Cyber Landscape, as well as how and why it is evolving
  • Understand the concept of cyber security risks and visibility, as well as emerging technology and social-technical environments

Unit 2 | Understanding Cyber Attacks and the Threat Landscape ( 1 hr 35 mins)     

  • Understand the attacker’s methodology using the cyber kill chain
  • Learn who the various threat actors are and their motivations, including their tactics, techniques, and procedures
  • Learn how the dark web can be used to facilitate criminal activity
  • Demonstrate methods used by a cybercriminal to exploit vulnerabilities
  • Provide additional context around critical security controls and defense strategies
  • Understand how to prepare for a cyber attack

Unit 3 | Cybersecurity Visibility and Actionable Hygiene (1 hr 25 mins)

  • Understand the consequences of a data breach and how to prepare better
  • Learn how and why information is critical to businesses
  • Learn and exercise confidentiality, availability, integrity, and non-repudiation assistance in the protection of information assets
  • Highlight the critical controls used to provide a layered approach to security-defense in depth

Unit 4 | Cyber Risk  (30 mins)

  • Understand Value at Risk - the potential losses you face from several perils
  • Understand the function and process of risk assessment
    • Assess the probability that a given peril materializes, and then evaluate the probability adjusted for your Value at Risk
  • Understand the function and process of risk management 
    • Identify which controls are required to reduce the probability of events and assess their costs and ROI for implementing them without introducing additional moral hazard
  • Understand the function and process of risk acceptance and transfer
    • Clarify how much structured worry your organization is willing to tolerate and how much insurance you should be willing to purchase
  • Understand how to present to the Board/Budgeting Committee/CFO
    • Tell the money people what you need and why in economic terms

Unit 5 | Risk Transfer - Cyber Coverage and Claims (30 mins)

  • Overview of first and third-party cyber coverage
  • Understand the key components of driving capital efficiency
  • Discuss recent cyber claims, lessons learned, and future trends

Unit 6 | Cyber Incident Simulation - Practice Makes Perfect (1 hr 15 mins)

  • Validate your incident response plan before an incident and highlight the importance of proactive planning
  • Highlight security gaps within policy, procedures, and guidelines 
  • Demonstrate that cyber is not just an IT risk and should be addressed as a business risk
  • Deliver an understanding of how a cyber policy can assist in the response to an incident
DISCLAIMER
By attending this event or program, whether remote or in person, you are entering an area where photography, audio and video recording may occur. Your entry and presence on the event premises constitutes your consent to be photographed, filmed, and/or otherwise recorded and to the release, publication, exhibition, or reproduction of any and all recorded media of your appearance, voice, and name for any purpose whatsoever in perpetuity in connection with Arceo Labs, Inc. d/b/a Resilience and its affiliates and subsidiaries including Arceo, Ltd. t/a Resilience Cyber Insurance Solutions (collectively referred to as “Resilience”), and its initiatives, including, by way of example only, use on websites, in social media, news and advertising.

By entering the event premises, or by joining the event remotely, you waive and release any claims you may have related to the use of recorded media of you at the event, including, without limitation, any right to inspect or approve the photo, video or audio recording of you, any claims for invasion of privacy, violation of the right of publicity, defamation, and copyright infringement or for any fees for use of such recorded media.  You understand that all photography, filming and/or recording will be done in reliance on this consent. If you do not agree to the foregoing, please notify Georgia White, georgiawhite@cyberresilience.com.

This event is intended solely for informational purposes. The views and opinions expressed as part of this event do not necessarily state or reflect those of Resilience. It is not intended, nor can it be relied upon, to create any rights enforceable by any party in litigation with Resilience, or to endorse the use of products or services provided by specific vendors. With respect to this event, neither Resilience nor any of their employees, makes any warranty, express or implied, including the warranties of merchantability and fitness for a particular purpose, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. This material is not intended as a solicitation for insurance purchases.Arceo Ltd is an Appointed Representative of Pro MGA Solutions Ltd who is authorised and regulated by the Financial Conduct Authority under reference 770419. Arceo Ltd is registered in England (No:11594316), Registered Office: 5 New Street Square, London, United Kingdom, EC4A 3TW