Cybersecurity Risk Management
You can directly choose a thoroughly designed training module from our off-the-shelf portfolio or contact us for a tailor-made training that meets your needs.
Our consultants are not only experts in their areas, but they’re also hands-on in applying and transforming their knowledge to the needs of the business.
Other than training and consultancy, you can contact with us for any impediments you’ve encountered in your business. Our experts will be ready to help you.
What We offer
One-day compact course
incl. case study workshop
3 subsequent months
Text your Questions
(1-Time & Remote)
Vulnerability Test and Confidential Report
Cyber Resilience Consultancy
(Upon request & based on Confidential Report)
The world has been transformed into a global village thanks to the advancements in, inter alia, transportation and communication. Among those advancements, internet is by far the most important. Day by day, our dependence to the internet increases, so does the quantity and quality of the cyber-attacks, transcending even governments’ capacity to tackle them.Almost two thirds (66%) of companies in Belgium were victims of cybercrime according to a large-scale research funded by BELSCO, a Belgian federal government body for research policy. Cybercrime doesn’t have borders, the estimated global cost of cybercrime is about €525 billion in which the estimation for Europe and Central Asia floats around €170 billion.
In this regard, cybersecurity risk management is becoming a fundamental part of management function of every organization, be it government or business. Horizon Global Academy’s Cybersecurity Risk Management course will enable managers in public and private sectors; analysts as well as security and technology specialists to grasp the cyber domain, facing threats and how to mitigate risks.
- Be aware of the risks posed by cyber threats.
- Be able to discern cyber threats and possible actors behind cybercrime.
- Grasp how cyber attacks pose risk to your business.
- Figure out assets in your business including AI powered systems.
- Not feel sidelined by IT experts nor perplexed by the complexity of their work, rather, supervise IT experts as they respond incidents.
- Lead designing an architecture to mitigate the risks posed by cyberthreats.
09:00 – 9:30
Registration and Light Breakfast
09:30 – 09:40
Cybersecurity as a Major Risk
09:40 – 10:20
Cyber Threats, Actors and Methodologies
10:20 – 11:00
Business Systems and Information Assets
11:00 – 11:10
11:10 – 11:50
Managing Cyber Risks and Leadership
11:50 – 12:30
Cybersecurity of AI Algorithms/AI Powered Systems
12:30 – 13:10
13:10 – 13:50
Cybersecurity and GDPR
13:50 – 14:30
Cyber Response Readiness (Supervising Incident Response)
14:30 – 16:00
Cybersecurity Mitigation Strategy (Case Study)
Katsiaryna (Kate) Labunets
Yusuf Yavuz Ayar
Thomas Lionel Smets
Yunus Emrah Bulut
Our Clients Are Like Family
We don’t believe in “catalogue” one-size-fits-all solutions. All our contents are shaped in close coordination with our clients and tailored to their needs.