IT and Cyber Security Certification Director Masterclass
- Step one. Decide On an IT and cyber Security Roadmap, Framework and Program
- Align and implement IT controls, measure, and map maturity to a defensible security program for business needs.
- Identify, implement or improve 10 security and risk management projects: data security strategy, Business-Aligned Cybersecurity Strategy, digitization, technology, cybersecurity, reduce IT risks, Defensible Data Security Budget, data security governance strategy, steps to implement IT and data security, deploying IT and cyber risk assessment
- How to Have an Engaging Conversation With Your CEO/Board About IT and cyber Risks
- The tools and narratives to get CEOs/Boards to keep them engaged.
- Balance Risk, Trust and Opportunity in an Uncertain World Of the pandemic, trade disputes, economic uncertainty
- How can digitalisation offer innovative means for navigating uncertainty in IT and cybersecurity
- Technology Risk and Cybersecurity Metrics for the Board and senior management
- The challenges, the need and the necessary characteristics
- Rebuilding Trust After a Security Breach on data privacy and trust. Plan, educate, execute and examine, internal and external steps to protect the corporate brand
- the tenets of DevOps; deployment models, technology threats, application security to achieve success in DevSecOps
- The Economics of Cyber Security: ‘Dismal Science’ for Security Decisions and balance digital business opportunity against cyber risk And security and risk dilemmas
- How to Respond to the 2020 Threat Landscape, by Optimizing prediction and prevention, Knowing when detection is required and Preparing to respond
- Establish, Maintain and Evolve a global Privacy Program with 60+ jurisdictions that follow a similar setup to maintain, evolving and share best practices, or pitfalls to avoid
- Combating the Insider — Understanding the Real Threat With tools and tactics need to be used to secure the business with insider threat mitigation programs.
- Creating a Defensible Data Security Strategy and a Data Risk Assessment
- Any business that creates, stores or processes data must identify, prioritize and mitigate business and financial risks.
- The Diversity Dilemma issues in tech, gender diversity, race and ethnicity with concrete actions for moving the problem
- CISO Effectiveness – The Four Facets of the CISO Role; boardroom issue, democratization of decisions, complex regulatory ecosystem, and CISO effectiveness.
- How to anticipate new cybersecurity threats and disruptive technologies, and different perspectives to drive compelling IT and cybersecurity communication
- When Ransomware Becomes Siege ware due to Connected systems in Smart Buildings, networks connected to allow for optimization, energy efficiency, and remote facility management.