fbpx

DRAFT

Cybersecurity Risk Management

Non-Technical Executives

Training

You can directly choose a thoroughly designed training module from our off-the-shelf portfolio or contact us for a tailor-made training that meets your needs.

Consultancy

Our consultants are not only experts in their areas, but they’re also hands-on in applying and transforming their knowledge to the needs of the business.

On-Demand Mentoring

Other than training and consultancy, you can contact with us for any impediments you’ve encountered in your business. Our experts will be ready to help you.

 Organisors Horizon Global AcademyOrganisers

What we offer Horizon Global Academy What We offer

One day offer Horizon Global Academy One-day compact course

incl. case study workshop
+

Offer package Horizon Global academyFollow-Up Package

3 subsequent months

Free text question Horizon Global AcademyFree follow-up package icon 48 48 Text your Questions

 

remote mnetoring Horizon Global AcademyFree follow-up package icon 48 48On-Demand Mentoring
(1-Time & Remote)

Audit offer Horizon Global Academy Free follow-up package icon 48 48Vulnerability Test and Confidential Report
(Upon request)

Discount Horizon Global AcademyCyber Resilience Consultancy
(Upon request & based on Confidential Report)

OVERVIEW HGA Overview

The world has been transformed into a global village thanks to the advancements in, inter alia, transportation and communication. Among those advancements, internet is by far the most important. Day by day, our dependence to the internet increases, so does the quantity and quality of the cyber-attacks, transcending even governments’ capacity to tackle them.Almost two thirds (66%) of companies in Belgium were victims of cybercrime according to a large-scale research funded by BELSCO, a Belgian federal government body for research policy. Cybercrime doesn’t have borders, the estimated global cost of cybercrime is about €525 billion in which the estimation for Europe and Central Asia floats around €170 billion.

According to German IT industry association BITCOM, more than half of the German companies suffered from cybercrime. It is estimated that this corresponds to a 55 billion euros’ worth of damage annually. In another research, conducted in collaboration with the UK Government, the cost of cybercrime to the UK is calculated to be £27bn (37 billion euro) per annum.

In this regard, cybersecurity risk management is becoming a fundamental part of management function of every organization, be it government or business. Horizon Global Academy’s Cybersecurity Risk Management course will enable managers in public and private sectors; analysts as well as security and technology specialists to grasp the cyber domain, facing threats and how to mitigate risks.

HGA Audience Audience

This course is designed for non-technical executives as well as interested and aspiring individuals / employees from the private or public sector. No IT background or prior technical knowledge is needed. The only prerequisite is a clear understanding of the cyber challenge and the need to counter it.

HGA Key Takeaway Takeaways

You will;

  • Be aware of the risks posed by cyber threats.
  • Be able to discern cyber threats and possible actors behind cybercrime.
  • Grasp how cyber attacks pose risk to your business.
  • Figure out assets in your business including AI powered systems.
  • Not feel sidelined by IT experts nor perplexed by the complexity of their work, rather, supervise IT experts as they respond incidents.
  • Lead designing an architecture to mitigate the risks posed by cyberthreats.

Programme Horizon Global Academy Programme

}

09:00 – 9:30

Registration and Light Breakfast

}

09:30 – 09:40

Cybersecurity as a Major Risk
The aim of this introductory part is to raise awareness on cybersecurity which is a business risk. The concept of risk management procedures will be explained before samples of security breaches of an organisation will be provided to illustrate. Other topics, such as operational business, litigation and reputational risks as well as the importance of carrying out risk management procedures will also be discussed.
}

09:40 – 10:20

Cyber Threats, Actors and Methodologies
Identifying the cyber threats, their target sectors and organisations as well as the actors perpetrating cybercrime is very important. Further information will be provided on how the actors commit cybercrime together with the methodologies to counter them.
}

10:20 – 11:00

Business Systems and Information Assets
The participants should spot business critical systems and assets to be protected from cyberthreats. The aim of this part is to investigate the degree of risk, evaluate the implications and detect measures to be taken to protect them.
}

11:00 – 11:10

Coffee Break

}

11:10 – 11:50

Managing Cyber Risks and Leadership
Leadership is vital to keep an organisation’s cyber domain secure. Participants would gain knowledge to implement management procedures to mitigate cyber threat risks and design a training program to implement best practices in this realm. At the end of the lecture, a cyber security leadership program will be examined.
}

11:50 – 12:30

Cybersecurity of AI Algorithms/AI Powered Systems
Proliferation of AI Algorithms and AI Powered Systems in business should not be taken for granted. This part aims to raise awareness of these systems/algorithms (such as machine learning feature) which brings immense advantages but also accompany increased risks in the cyber domain of an organisation.
}

12:30 – 13:10

Lunch

}

13:10 – 13:50

Cybersecurity and GDPR
Legal aspects of managing cyber risks will be explored. The participants will learn to identify the impact of failing to take legal considerations into account and explore an organisation’s requirements as well as its adherence to these requirements.
}

13:50 – 14:30

Cyber Response Readiness (Supervising Incident Response)
The aim of this part is to gain knowledge on how to execute the suitable response to a cybersecurity breach in an organisation. The participants should understand the phases of a security breach (detection, communication and containment), implement the procedures to mitigate possible damages of a cybersecurity breach and learn the roles played by the actors therein. At the end of the lecture, participants will examine an incident response plan to counter a cybersecurity breach, including measures to detect the breach, the chain of communication and procedures to control the damage.
}

14:30 – 16:00

Cybersecurity Mitigation Strategy (Case Study)
Participants will examine key points of an effective mitigation strategy, study on the implications of implementation and learn how to allocate the financial resources. For completion of the course, the participants will discuss case studies on mitigation strategy.

Lecturers Horizon Global Academy Lecturers

Katsiaryna (Kate) Labunets

Postdoc Researcher at TU Delft

Yusuf Yavuz Ayar

Security Specialist at Mindcurv/Horizon Global Academy Lecturer

Birol Ayvat

Analyst-Cyber Defence Strategy Developer/Horizon Global Academy Lecturer

Thomas Lionel Smets

Security Consultant & Designer/Horizon Global Academy Lecturer

Yunus Emrah Bulut

Data Science Instructor, Consultant and Author/Thinkful and Datajarlabs/Horizon Global Academy Lecturer

Horizon Global Academy registration Icon Registration

Join Us

Our Clients Are Like Family

We don’t believe in “catalogue” one-size-fits-all solutions. All our contents are shaped in close coordination with our clients and tailored to their needs.

 

Contact Us

info@horizonglobalacademy.eu

+32 (0) 2 801 13 57-58

Davincilaan 1, 1932 Brussels Belgium

12 + 5 =