CSCSSCSCSS
CSCSS
Centre for Strategic Cyberspace + Security Science
+855.237.8767 Global[email protected]
CONTACT
 
  • Regions
  • Topics
  • Programs
  • Analysis
  • Experts
    • Experts
    • Experts Program
  • Events
    • CYBERIMMERSION WORKSHOP
    • Events
    • Featured Speakers
    • Event Partners
  • Podcasts
  • News + Press
  • Who We Are
    • About Us
    • CSCSS International
    • Board of Directors
    • Corporate Officers
    • Global Advisory Board
  • Contact
    • Contact
    • Connect
  • Support CSCSS
FacebookTwitterInstagramSoundCloudDelicious
  • Regions
  • Topics
  • Programs
  • Analysis
  • Experts
    • Experts
    • Experts Program
  • Events
    • CYBERIMMERSION WORKSHOP
    • Events
    • Featured Speakers
    • Event Partners
  • Podcasts
  • News + Press
  • Who We Are
    • About Us
    • CSCSS International
    • Board of Directors
    • Corporate Officers
    • Global Advisory Board
  • Contact
    • Contact
    • Connect
  • Support CSCSS

CYBERIMMERSION Workshop

February 12-13, 2018 Toronto, Canada

CYBERIMMERSION

The CSCSS CYBERIMMERSION workshop is designed to equip Project Managers, Business Analysts, HR, and IT Professionals with the fundamentals of cyber security. Cyber security is an essential part of operational planning since breaches are all too common, and can cost companies millions of dollars in revenue and reputational damage.

CS# 0428

$1590 CDN

ENROLL

Course Overview

Despite its fundamental importance in risk management, cyber security often remains siloed within organizations, with complex jargon and technical expertise functioning as a barrier to proper management and planning. In this workshop, we will address the basics of cyber security in simple, easy to understand language with key takeaways that will help you manage this critical portion of your business.

Workshop Modules

  • Intelligence: The Planners Strategic Edge
  • Security Penetration Testing Management

We will cover three core criteria of cyber security: intelligence, security assurance + testing, and breach response. Lessons will be structured around real world examples of cyber threat and operational experiences.

Key Elements + Takeaways

  • Master the relationship between Intelligence + Cyber
  • Understand ‘Threat’ Intelligence and attack profiling
  • Through case study, comprehend the fundamental approaches to information security testing and incident management
  • Grasp the ramifications, impact, and remediation options during 
and after an attack
  • Identify the underlying aspects and impact of a breach and recovery
  • Address the fundamental and critical action steps between senior management, project managers and practitioners

What You'll Learn

  • Successfully integrate intelligence + security as a process into strategic and program planning
  • Understand information security countermeasures to secure your organization against threats
  • Leverage the link between intelligence, information, security and resilience.
  • Address the fundamental and critical communications between senior management and project managers and practitioners

Outline

Open a section below to explore each module of this course

Module 1 / Intelligence: The Planners Strategic Edge

Intelligence: The Planners Strategic Edge is an expert led, interactive workshop. The purpose of the workshop is to familiarize participants with intelligence and how to integrate cyber intelligence into their cyber security profile.

When correctly employed, intelligence including ‘threat intelligence’ as described by the computer security industry, provides focus for:

  • Long-term planning (strategic intelligence);
  • Direction in the current cyber environment (using intelligence for operational management)
  • Situational awareness and tactical intelligence supporting defence against current attacks, cyber, social and/or physical.

Participants will learn how executive direction is translated by the intelligence team in order to deploy specific products to specific management levels in the organization. This workshop provides project managers, security leaders and system integrators with the tools to deploy and utilize intelligence in their organizations.

A key feature of the workshop is the integration of intelligence into security processes and the distribution of intelligence products. Participants should be able to discuss examples of: corporate organizations, IT security organizations as well as cyber security policies. Participant examples will be used in discussions on how-to implement intelligence processes and procedures.

Key Takeaways

  • Become proficient with critical definitions of Intelligence and intelligence processes
  • Understand the difference between ‘threat intelligence’ and integrated intelligence
  • Gain insight into the differences between ‘analysis’ and ‘intelligence’
  • Project managers will learn to integrate cyber + intelligence into security processes
  • Determine the prerequisites required BEFORE intelligence processes can be initiated
  • Learn the importance of getting intelligence direction from your CEO/President
  • Discover the different types of intelligence reporting.
  • Master the distinctive elements of a thorough intelligence report.
  • Know what you should expect from an intelligence provider.
  • Perfect what an intelligence team will expect of your organization.
  • Tie in your lessons learned to maximize the return on investment for your security investment

The workshop opens with an example of ‘executive level intelligence.’ This is followed by outlining some key intelligence definitions and then describing processes essential to implementing intelligence. The final areas covered are: what is needed to support an intelligence team and a discussion of ‘actionable intelligence.’

Module 2 / Security Penetration Testing Management

This is a workshop designed to address skills, methodologies and knowledge required to properly conduct information assurance testing in a structured manner. It will empower managers to fully understand the impact and pitfalls of penetration testing and engagement management.

Security penetration testing is an excellent method for determining the strengths and weaknesses of a network and its architecture. However, the process of performing a penetration test is complex, and without due diligence and care can have disastrous effects on the systems being tested. This workshop will lead participants through the processes involved in proposals, scoping, contractual elements, and NDA requirements. It will cover the fundamentals of testing, spanning the relative phases of penetration testing and ‘attack’, leading to reporting and document preparation and security.

Penetration testing is best performed by a team, which delivers several benefits from both a technical and a managerial standpoint ensuring a successful test.

  • Understanding basic definitions and elements of security testing including legal requirements
  • Learn how to run and manage testing through teams to ensure efficiency and accountability
  • Essential components of security tests and methodologies
  • Knowing the various phases of a security test and information feedback
  • Application of elements, including legal agreements, tools, technologies, scoping, attack planning and project management
  • Engagement management and communications, in test and post engagement reporting, delivery, expectations and data security

Key takeaways:

  • Discover and incorporate lessons into your specific security testing methodologies
  • Understand the attack process, and associated management
  • Comprehend the tools, technologies, their employment, and placement in the process of conducting a security test
  • Think strategically and incorporate testing into an ongoing program
  • Learn how to effectively assess, scope, plan and deliver a security test
  • Recognize the potential ramifications and impact of testing, during and after testing has taken place
  • Tie in lessons learned: understand what your company can do to prevent an attack
  • Gain insight into the mindset of Threat Actors and how they look at your network
  • Learn key concepts associate with cybersecurity testing, trends and terminology and their application

Important Course Information + Prerequisites

A strong working knowledge of networks and cyber security an asset

CSCSS Instructor Team

Richard Zaluski

President, CEO Chairman, & Founder

Personal blog / website
David Swan

Executive Vice President, Defence Intelligence Group

Course Delivery

CONTACT US
For more information on the CYBERIMMERSION Workshop or to book this course and please contact Helen Hoddinott or Paul Simion
  • Phone
    905-947-8562
  • Address
    Bay3000 Consulting Inc. 200 Town Centre Blvd, Suite 402-200 Markham, ON L3R 8G5

Course Date

February 13-14, 2018

Price for 2 Day Course

  • $1,590 Full Price
  • $1,395 Early Bird Price 

 

Individual Pricing

  • Intelligence: The Planners Strategic Edge $795 – February 13, 2018
  • Security Penetration Testing Management $795 – February 14, 2018
  • Early Bird : 5% off Individual Booking / 10% off Combined Booking

Hosted In Partnerhship

Bay3000
ABOUT CSCSS
The Center for Strategic Cyberspace + Security Science is a bipartisan, multilateral, international nonprofit organization headquartered in London, United Kingdom. It seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.
CONTACT US
+44 12342134123
  • London UK
    +44 2035141784
  • Washington, D.C, USA
    + 571.451.0312
  • Middle East + Asia Pacific
    +855.237.8767
  • STAY CONNECTED WITH CSCSS
    [email protected]

Find us on:

FacebookTwitterLinkedinInstagramSoundCloud
TRENDING
  • The Canada-China Cyber Agreement Remains Questionable
    December 13, 2017
  • Webinar : Introduction to Cyber Intelligence
    August 30, 2017
  • WOSU Radio Show -Global Security and Warfare
    July 14, 2017
FEATURED PROJECTS + PROGRAMS
© 2015 Center for Strategic Cyberspace + Security Science / CSCSS