Objectives of the training
At the end of this training, participants will be able to build a high-level action plan about cybersecurity.Targeted audience
Business leaders, level 1 and 2 managers and anyone directly accountable for cybersecurity.Prerequisite
NoneTrainers
Course architecture
- Objective of the LU: Upon completion of this course, the participant will be able to identify cybersecurity failures.
- Summary description of the LU
Loss of data, temporary interruption of activity, degradation of brand image, decrease in sales...: the participant will become aware of the consequences of a cybersecurity failure while understanding how to identify them.
- Key knowledge involved
- Error search
- Malfunctions
- Incidents
- Critical thinking and analysis?
LU2 - How to identify preventive actions
- Objective of the LU: At the end of this LU, the participant will be able to choose preventive actions according to the observed failures.
- Summary description of the LU
The participant will acquire a foundation for ensuring the protection of technology infrastructures through preventive actions about security incidents, of attempted hacking as well as through the implementation of risk mitigation or threat eradication measures.
- Key knowledge involved
- Preventive actions
- Organization of actions
- Stakeholders?
- Analysis framework used in cybersecurity
LU 3 - Analyze and complete preventive measures
- Objective of the LU: At the end of this LU, the participant will be able to enhance the list of prevention in cybersecurity actions using the framework.
- Summary description of the LU
When implemented together, security measures minimize the intrusion or impact of a cyber-attack on networks. The selection and prioritization of the best IT security measures is based on the analysis performed by the cybersecurity manager.
- Key knowledge involved
- Checkpoints
- Gaps to fill
- Accountability?
LU 4 - How to prioritize a cybersecurity prevention plan
- LU objective: Upon completion of this LU, the participant will be able to prioritize from the list of all prevention actions.
- LU Summary Description
In order to effectively prevent cybersecurity attacks or to adequately respond to incidents, one must prioritize remediation or monitoring of control points.
- Key knowledge involved
- Strategy for prioritizing actions
- Best practices
LU 5 - How to conduct an audit
- LU objective : Upon completion of this LU, the participant will be able to conduct a cybersecurity audit.
- Summary description of the LU
This final learning unit is intended to be a summary of the training. The trainer will act as the CEO of a fictitious company; he will present the situation of his company and answer questions from the participants. The participants will have to conduct a cybersecurity audit of their company and propose an action plan. This simulation will allow them to validate their knowledge before putting it into practice in their organization.
Pedagogical details
Training architecture
Case study, exchanges, discussions, team work, audit simulation.
Type of training
Private or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quotePrivate or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quote