Cyber Risk Management
London
Greater London
EC3A 7BX
United Kingdom
What You Will Learn :
- Understand the best place to start when creating an effective cyber risk programme
- How to integrate cyber risk and IT
- The role technology plays in cybercrime including notable attacks
- How human behaviour affects cyber risk
Description
Join us for this online course designed specifically for those working in cyber risk.
Attendees will gain a new understanding of how to approach cyber risk management. Topics such as creating an efficient and usable cyber risk program as well as addressing the common gaps in cybersecurity programs that facilitate cyber-attacks will be covered in-depth by seasoned instructors.
Over the course of four days, delegates will have the opportunity to learn from like-minded practitioners from various financial organizations from both the US and Europe offering a global perspective. This fully online training will comprise of two 60 minute engaging presentations per day including the opportunity for discussion and Q&A.
Learn how to apply best practice approaches within your cyber risk management program.
What will you learn?
- How to integrate cyber risk and IT
- The role technology plays in cybercrime includes notable attacks
- Understand the best place to start when creating an effective cyber risk program
- Third-party vendor risk in relation to cyber risk management
- Cyber security and methods of prioritizing cyber risk
- How human behavior affects cyber risk
- Common gaps within cybersecurity programs
Training Course Content
Sessions Include
- Integrating cyber risk and IT
- Relationship between cyber risk and human behavior
- Cybercrime – lessons to be learned
- Cyber security and cyber risk
- Common gaps in cybersecurity programs that facilitate cyber-attacks
- How to create cyber governance in your organization
- Creating an efficient and usable cyber risk program
- Third-party vendor risk
Who is this course for?
Relevant departments may include but are not limited to:
Cyber risk
Risk management
Operational risk
Cybercrime
Cyber security
Third party risk
Cyber governance