Cybersecurity is now a major concern in all businesses, regardless of size. No one is immune. This course is intended for executives and managers who are not sure that the measures taken in their companies are sufficient. It's not so much about technology, it's about governance, employee training, awareness of risks and issues, and policies in place in companies. Think you are ready and safe in your business? This course will help you identify failures you do not suspect, prepare an action plan and raise awareness among teams.
Objectives
At the end of this training, participants will be able to build a high-level action plan about cybersecurity.
Is it for you ?
Business leaders, level 1 and 2 managers and anyone directly accountable for cybersecurity.
Your benefits
Content
1 - How to identify computer failures
Loss of data, temporary interruption of activity, degradation of brand image, decrease in sales...: the participant will become aware of the consequences of a cybersecurity failure while understanding how to identify them.
- Error search
- Malfunctions
- Incidents
- Critical thinking and analysis
See more + / -
2 - How to identify preventive actions
The participant will acquire a foundation for ensuring the protection of technology infrastructures through preventive actions about security incidents, of attempted hacking as well as through the implementation of risk mitigation or threat eradication measures.
- Preventive actions
- Organization of actions
- Stakeholders
- Analysis framework used in cybersecurity
3 - Analyze and complete preventive measures
When implemented together, security measures minimize the intrusion or impact of a cyber-attack on networks. The selection and prioritization of the best IT security measures is based on the analysis performed by the cybersecurity manager.
- Checkpoints
- Gaps to fill
- Accountability
4 - How to prioritize a cybersecurity prevention plan
In order to effectively prevent cybersecurity attacks or to adequately respond to incidents, one must prioritize remediation or monitoring of control points.
- Strategy for prioritizing actions
- Best practices
5 - How to conduct an audit
This final learning unit is intended to be a summary of the training. The trainer will act as the CEO of a fictitious company; he will present the situation of his company and answer questions from the participants. The participants will have to conduct a cybersecurity audit of their company and propose an action plan. This simulation will allow them to validate their knowledge before putting it into practice in their organization.
💡 Useful information
Our training sessions are offered in Montreal or Quebec City, in person or in virtual format. Dates and locations are provided when you select your session below. If you have any questions regarding registration, schedules, the language of instruction, or cancellation policies, please consult our FAQ .
Trainers
Private or personalized training
Do you have several employees interested in the same training course? Whether in person at your offices or remotely in virtual mode, we offer private training courses tailored to your team's needs. Group rates are available. Contact us for more details or request a quote online.
Request a quote