Training courses CISO 360 Middle East Congress 2018
*Training details and timings are subject to change.
*Training details and timings are subject to change.
A one-day training course for CISOs, CSOs, COOs, senior managers, as well as regulators, CEOs and board members. New governance principles help senior managers understand strategy and make decisions in a crisis. Delegates will learn the operational decision-making skills for 5 governance principles that underpin security management. The new governance tactics and strategies covered in this course are to support a general crisis governance framework for government and business.
This course is based on the UK Department for Transport (DfT) sponsored Codes of Practice for Cyber Security of Ports and Port Systems, and Vessels, that were prepared by the Institution of Engineering and Technology (IET). The IMO’s ISPS Code requires port and vessel operators to put in place appropriate controls and supporting business practices to address security risks, including those that are cyber related.
This 2-day course focuses on the rapidly changing business and technical environment and how the choice of standards and codes of practice can make a significant difference to the success of your organisation. There are a range of existing cyber security related standards, publicly accessible specifications (PAS) and codes of practice. The choice of whether to implement specific standards can have a significant impact on your organisation’s costs and performance.
The two-day catastrophic risk course covers methodology to quantify risks that threaten critical operations, specially pertaining to energy, leisure and transportation infrastructures. The course takes participants beyond general risk frameworks to understand the value of adding procedures to sustain business operations when catastrophic events threaten the survival of the organisation, services or people.
Over two days, delegates are shown the reality of just how easy real cyberattacks can be – even those with the most devastating effects – and the implementation of simple measures to avoid catastrophic risk. The course is suitable for entirely non-technical officers as well as cyber managers and administrators who wish to develop a sound understanding of just how easy and low-tech the efforts of an attacker can be, and how to implement mitigation or who wish to upgrade their existing skills to become more cost effective for their organisation
You currently have JavaScript disabled!
This site requires JavaScript to be enabled. Some functions of the site may not be usable or the site may not look correct until you enable JavaScript. You can enable JavaScript by following this tutorial. Once JavaScript is enabled, this message will be removed.