Program Overview
A report published by Netwrix, an IT Audit and Security company with clients such as Allianz, Airbus and AT&T to name a few, found the 100% of US Government organisations, see their own employees as the biggest threat to security. The graph below shows that human errors caused 57% of incidents in government organisations. In addition, 43% of the organisations had to also investigate incidents involving insider misuse.
Despite these frightening figures, the solution is extremely simple – appropriate cyber-awareness training for large sections of employees in an organisation, can reduce its risk by up to 70%, according to Aberdeen Group.
This program is designed for government entities and large organisations with the aim of increasing employee awareness and, consequently, reducing their cyber-related risks in a cost-effective manner. The program will cover topics such as attack surfaces, applicable legislation, practical steps on increasing personal cyber-resilience, etc.
Learning Outcomes
Upon completion of this program, participants will:
- Understand the legislation applicable to records protection within organisations
- Appreciate the complexity of organisational environments and the various elements susceptible to cyber attacks
- Identify the weak points in cyber-safety, such as the human factor, social engineering, etc.
- Develop procedures for whole teams, improving their cyber-resilience
- Increase personal cyber-resilience through a number of practical steps, outlined during the program
Intended Audience
This program is suitable for all professionals who have access to a computer system as part of their work duties. It is applicable across all departments and employee levels within an organisation.
Program Level and Pre-requisites for Attending
Foundation level, no pre-requisites
Program Duration
1 hour 45 minutes
Number of Attendees
Maximum 70 attendees
Program Outline
- Introduction
- Cybercrime Overview
- Privacy and Cybersecurity-related Legislation
- Cybersecurity Environment and Associated Vulnerabitilities
- Managing Cybersecurity Risks - Processes and Methodologies
- Practical Steps for Increasing Personal Cyber-resilience
- Program Review, Q&A, Comments