Events Search and Views Navigation
-
During the first 3-day session (Foundation) you will learn: The purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. The Foundation course introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber [...]
Find out moreThe RESILIATM Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. For more [...]
Find out moreThe RESILIATM Practitioner course starts by revisiting the concepts and knowledge acquired in the Foundation course and requires you to bring that knowledge into practical activities in interesting real-life scenarios. The course begins with distinguishing among the terms: asset, risk, threat and vulnerability. It determines the key activities needed to address risks and opportunities as well as to create and manage a risk register and a risk treatment plan. Further, it explains the purpose and use of the control objectives for cyber resilience processes, and the interactions and activities that are aligned with corresponding ITSM activities. In the final part of [...]
Find out more