Cyber Resilience 101
ABOUT
Our Cyber Resilience 101 Course is designed to equip you with cyber risk management knowledge and skills. In today's rapidly evolving digital landscape, staying ahead of cyber risks and ensuring your clients’ cyber resilience is crucial. This course is tailored to provide you with a solid foundation in cybersecurity principles and best practices. A complete overview of the curriculum can be found below.
Our expert instructors will guide you through engaging modules, interactive discussions, and real-world case studies to ensure a practical and immersive learning experience.
Instructors:
Si West, Cyber Resilience Coach & Director of Customer Engagement at Resilience
Accreditation:
This course is NCSC assured and carries 7 CE credits and CPD
WHEN
Wednesday, November 29
9:00 AM - 5:00 PM | Programming (Lunch Included)
5:00 PM - 6:30 PM | Happy Hour
WHERE
London
NEXT STEPS
You will receive an email confirmation once your spot is secured. Please contact, Ingrid Smith, Marketing Director, at ingridsmith@cyberresilience.com, with any questions.
ABOUT THE INSTRUCTOR
Si West
Cyber Resilience Coach & Director of Customer Engagement at Resilience
Si West has more than 25 years of global security risk management experience across government, military, and civil agencies. He is a National Cyber Security Centre (NCSC) certified instructor leading training for global underwriting teams on complex risk issues. West served over 14 years in the Royal Marines and has an MSc in Cyber Security and Human Factors from Bournemouth University.
CYBER RESILIENCE 101 CURRICULUM OVERVIEW
Unit 1 | Introduction to Cyber Resilience (1 hr 25 mins)
- Introduce the concept and context of the Cyber Landscape, as well as how and why it is evolving
- Understand the concept of cyber security risks and visibility, as well as emerging technology and social-technical environments
Unit 2 | Understanding Cyber Attacks and the Threat Landscape ( 1 hr 35 mins)
- Understand the attacker’s methodology using the cyber kill chain
- Learn who the various threat actors are and their motivations, including their tactics, techniques, and procedures
- Learn how the dark web can be used to facilitate criminal activity
- Demonstrate methods used by a cybercriminal to exploit vulnerabilities
- Provide additional context around critical security controls and defense strategies
- Understand how to prepare for a cyber attack
Unit 3 | Cybersecurity Visibility and Actionable Hygiene (1 hr 25 mins)
- Understand the consequences of a data breach and how to prepare better
- Learn how and why information is critical to businesses
- Learn and exercise confidentiality, availability, integrity, and non-repudiation assistance in the protection of information assets
- Highlight the critical controls used to provide a layered approach to security-defense in depth
Unit 4 | Cyber Risk (30 mins)
- Understand Value at Risk - the potential losses you face from several perils
- Understand the function and process of risk assessment
- Assess the probability that a given peril materializes, and then evaluate the probability adjusted for your Value at Risk
- Understand the function and process of risk management
- Identify which controls are required to reduce the probability of events and assess their costs and ROI for implementing them without introducing additional moral hazard
- Understand the function and process of risk acceptance and transfer
- Clarify how much structured worry your organization is willing to tolerate and how much insurance you should be willing to purchase
- Understand how to present to the Board/Budgeting Committee/CFO
- Tell the money people what you need and why in economic terms
Unit 5 | Risk Transfer - Cyber Coverage and Claims (30 mins)
- Overview of first and third-party cyber coverage
- Understand the key components of driving capital efficiency
- Discuss recent cyber claims, lessons learned, and future trends
Unit 6 | Cyber Incident Simulation - Practice Makes Perfect (1 hr 15 mins)
- Validate your incident response plan before an incident and highlight the importance of proactive planning
- Highlight security gaps within policy, procedures, and guidelines
- Demonstrate that cyber is not just an IT risk and should be addressed as a business risk
- Deliver an understanding of how a cyber policy can assist in the response to an incident