Cyber Security Risk Management
Cyber security issues are becoming a day-to-day struggle for businesses and the management of these risks goes way beyond the IT department. In this course, explore your role in protecting your organisation from cyber threats through effective strategies, plans and resources.
£100 +VAT

Cyber Security Risk Management
£100 +VAT

Cyber Security Risk Management
This course is not currently available. To find out more, please get in touch.
This course will enable you to
- Understand cyber risks and how to protect your organisation
- Develop strategies for the management and mitigation of cyber risk
- Assess how safe your organisation is and whether your IT team is adequately resourced
- Manage corporate information outside the office, including the risks involved in using mobile devices and storing data in the cloud
- Plan and gather the resources needed to respond to cyber incidents
About the course
Cyber security issues are becoming a day-to-day struggle for businesses and with more remote working than ever, the opportunities for cyber criminals are on the increase. Effective cyber risk management needs to go way beyond the IT department if you are to mitigate and manage the threats to your organisation.
This course offers a detailed overview of cyber risks and the threats to your organisation and explores why cyber security is the responsibility of all managers. The course will help you devise effective strategies and gather appropriate resources for mitigating risks both within and outside the office and prepare your organisation’s response to any cyber threats.
Contents
Introducing cyber risk
What is cyber risk?
Accountants and cyber security
Why is cyber risk important?
Who causes the damage?
What can go wrong?
Ransomware
The internet of things
Who should be involved in risk management?
Technophobia
Managing cyber risks
Understanding our cyber risks
Technical, process and people risks
Whose problem is it?
What is the best strategic approach?
Cyber risk management
Taking an holistic approach
The everyday risks of email
Home working
Systems risks
Information security basics
Protecting ourselves
Are you prepared for an event?
Staying safe
People using networks
The internet of things
Social media risk
Disposing of data
Security outside the office
Protecting a Swiss cheese
Mobile devices
Staying safe on the move
BYOD issues
Cloud-based services
Storing data in the cloud
Responding to threats
Preparation
The right team
Preparing for an incident
Responding to an incident
Threat levels and the kill chain
Classifying incidents
Deep fakes
How can we recover and learn?
The golden rule
How it works
Author

Jeremy Swinfen Green
Has been working in online marketing, communication and business strategy since 1993.
You might also like
Take a look at some of our bestselling courses








