TOPICS

Course Outline
1. Intro to Cyber Resilience
What is cyber resilience?
Benefits of cyber resilience
Terms
Purpose of balancing
2. Risk management
What is risk management?
Purpose of risk management
Terms: Risk, asset, vulnerability, and threat
Actions to address risks and opportunities
3. Managing Cyber Resilience
Purpose and scope of a management system
Components of a management system
Relevance of common management standards and best practice frameworks to cyber resilience
Management, governance, and compliance
4. Cyber Resilience Strategy
What is cyber resilience strategy intended to achieve?
Cyber resilience activities that should be aligned with IT service strategy
Purpose and key features of the control objectives
Interactions between the following ITSM processes and cyber resilience
5. Cyber Resilience Design
What is cyber resilience design intended to achieve?
Cyber resilience activities that should be aligned with IT service design
Purpose and key features of the control objectives
Interactions between the following ITSM processes and cyber resilience
6. Cyber Resilience Transition
What is cyber resilience transition intended to achieve?
Purpose and key features of the control objectives
Interactions between the following ITSM processes and cyber resilience
7. Cyber Resilience Operation
What is cyber resilience operation intended to achieve?
Purpose and key features of the control objectives
Interactions between the following ITSM processes and cyber resilience
8. Cyber Resilience Continual Improvement
What is cyber resilience continual improvement intended to achieve?
Maturity models and their purpose
Purpose and key features of the control objectives
How the seven-step improvement process can be used to plan cyber resilience improvements
How to use ITIL CSI approach to plan cyber resilience improvements
9. Cyber Resilience Roles and Responsibilities
Segregation of duties and dual controls
10. Risk Management
Terms: Risk, asset, vulnerability, and threat
Distinguish between the terms: risk, asset, vulnerability, threat
Actions needed to address risks and opportunities and explain their purpose
11. Cyber Resilience Strategy
Purpose and use of the control objectives:
How ITSM processes and cyber resilience interact
12. Cyber Resilience Design
Purpose and use of the control objectives
How ITSM processes and cyber resilience interact
13. Cyber Resilience Transition
Purpose and use of the control objectives
How ITSM processes and cyber resilience interact
14. Cyber Resilience Operation
How ITSM processes and cyber resilience interact
15. Cyber Resilience Continual Improvement
Purpose and use of the control objectives
Apply the seven-step improvement process to plan cyber resilience improvements
Apply the ITIL CSI approach to cyber resilience
16. Segregation of Duties and Dual Controls
Apply the concepts of segregation of duties and dual controls to an organizational context.

  • PRIVATE
  • 10 Days
  • 0 Units
  • 0 Hrs

Select Your Currency

WOOCS 1.1.8
Drop Us A Query
[contact-form-7 id="5639" title="Drop Us A Query"]
© 2016, ALL RIGHTS RESERVED.
Create an Account