Cybersecurity Programme and Risk Management
Training Provider: SINGAPORE MANAGEMENT UNIVERSITY
Course Reference: TGS-2020503010
S$900
Original: S$3,000
Save S$2,100
About This Course
This workshop will equip participants with the understanding of policies, process, procedures, standards, guidelines, baselines relating to security (e.g. using ENISA, NIST) and other applicable frameworks; data and technology governance of cybersecurity; threat intelligence and sharing, risk management practices; cybersecurity requirements.
What You'll Learn
1. Three Main Security Goals(CIA) and its relevance in Cyber Security Program
2. Frameworks and standards for consideration
3. Cyber Security Program Management – components for consideration
- Cybersecurity governance
- Threat identification
- Risk management
- Risk mitigation
4. Cyber Security Governance– where, what and how (Strategy planning, roadmap, resource planning & deciding a list of policies, procedures, standards and processes)
5. Threat Identification
- Threat intelligence and Sharing – why the importance and the methodology
- Threat intelligence and detection
- Threat analysis and defence
6. Cyber Security Risk Management
- Cataloguing the risk
- Quantifying the risk
- Measuring the risk
- Communicating the risk
7. Types of Security Controls – preventative, detective & Responsive
8. Risk Mitigation
- Responsibilities of Security Architect(implement or configure added controls)
- Responsibilities of SOC(adopt and monitor added controls)
9. Cyber Security requirements
- Policy, Process, Procedures, Standards, Guidelines, Baselines
- Confidentiality, Integrity and Availability
- Authentication, Authorization and Auditing
- Threat Modelling
- Data/Information Governance
- Zero Trust Network
- Activity-based Security Controls – Deterrent, Preventive, Detective, Corrective
- Cybersecurity Operations Centre – people, process, technology, regulations, standards
- Incident Management – Detection, Prevention, Response
- Business Continuity Planning (BCP) & Disaster Recovery
- Security by Design Principles
- Security Education and Awareness
2. Frameworks and standards for consideration
3. Cyber Security Program Management – components for consideration
- Cybersecurity governance
- Threat identification
- Risk management
- Risk mitigation
4. Cyber Security Governance– where, what and how (Strategy planning, roadmap, resource planning & deciding a list of policies, procedures, standards and processes)
5. Threat Identification
- Threat intelligence and Sharing – why the importance and the methodology
- Threat intelligence and detection
- Threat analysis and defence
6. Cyber Security Risk Management
- Cataloguing the risk
- Quantifying the risk
- Measuring the risk
- Communicating the risk
7. Types of Security Controls – preventative, detective & Responsive
8. Risk Mitigation
- Responsibilities of Security Architect(implement or configure added controls)
- Responsibilities of SOC(adopt and monitor added controls)
9. Cyber Security requirements
- Policy, Process, Procedures, Standards, Guidelines, Baselines
- Confidentiality, Integrity and Availability
- Authentication, Authorization and Auditing
- Threat Modelling
- Data/Information Governance
- Zero Trust Network
- Activity-based Security Controls – Deterrent, Preventive, Detective, Corrective
- Cybersecurity Operations Centre – people, process, technology, regulations, standards
- Incident Management – Detection, Prevention, Response
- Business Continuity Planning (BCP) & Disaster Recovery
- Security by Design Principles
- Security Education and Awareness
Course Details
Back to All Courses
Note: To apply for this course, visit the SkillsFuture website or contact the training provider directly.
More Courses from SINGAPORE MANAGEMENT UNIVERSITY
In today’s rapidly evolving technological landscape, the emphasis on digital transformation is mor...
This certificate programme is designed for non-technical professionals who want to develop data visu...
This programme covers the operational aspects of data protection and information security. It seeks ...