Corporate Compliance Seminars - Left Menu, General Pages
|
Cybersecurity Risk Management Programs
New cybersecurity risk regulations for all organizations are approaching faster than you might think.
"Computers, software, programming and algorithms are all parts of a cybersecurity risk program, but it is the interaction with the "humans" that makes all the difference in world."
An effective cybersecurity risk program requires an organization to have everything from program policies to incident response plans to specific breach notification procedures. Banking and insurance organizations also have to certify compliance to their regulators. It is important to learn how to approach cybersecurity risks on a holistic basis and what you can do now to start managing cyber risk before a risk event occurs.
This training program focuses on describing the effective components of a modern cybersecurity risk management program. The attendees will be prepared to start the evaluation of an existing program. They will then be able to discuss with senior management, the audit committee, and the board of directors how to proceed in improving cybersecurity risk management. Five main components of an effective program are reviewed: data, control implementation, verification, breach preparedness and risk management.
This comprehensive training course is for anyone who wants to have a strong base of knowledge and understanding of the essentials of cybersecurity risk management. We cover an overview of ten principles that need to be considered within a Cybersecurity Risk Management Program in a short video available on YouTube. Here is a link to it:Cybersecurity Risk Management Principles
This timely, two-day CPE training seminar is designed for the project director, project leader and individuals who have to create effective cybersecurity program and the related documents.
Follow the below links for further detail information:
. Seminar Highlights
. Learning Objectives
. Key Issues on the Agenda
Each attendee will receive 16 CPE Hours. A certificate of completion will be provided.
The retail cost of this 16 CPE seminar is $1,195.00 for the first attendee from a single organization. Discounts are available for more than one attendee from each organization: (2) $2,270.00 (3) $3,270.00 (4) $4,060.00 (5) $4,780.00.
To reserve your space, click on the "SIGN-UP NOW!" link in the right margin, complete the registration form and use the corresponding "Submit Registration Form and Move to Payment Options Page" button for filing the registration and moving to the payment page.
Each attendee will receive 16 CPE Hours (YB). A certificate of completion will be provided.
Program Level of Understanding: Basic
Prerequisites: None
Advance Preparation: None
Delivery Format: Group Internet Based
NASBA Field(s) of Study: Auditing, Business Management & Organization, Information Technology
CPE Credits: 16, based on 50 minutes of instruction per hour
Testimonials:
Presentation of all three day events is contingent until full payment has been received for three attendees. Once this requirement is meet, we update the seminar status with "Confirmed Event".
Our instructors are experts in risk management, auditing, corporate accounting, executive management, information technology and CPA firm operations. Our goal is to provide expert advice on COSO ERM, COSO, FDICIA, COBIT, NIST, ITIL, CMMI, FCPA, PCAOB standards, AICPA standards and cyber risk management.
Upcoming Cybersecurity Risk Management Programs Events:
Refer to our Seminar Cities Index for a list of our seminar locations. The individual city
pages provide a listing of topics being presented. Our Seminar Cities by Week provides a
guide to the locations during a calendar week.
top of page
Seminar Highlights
. What are the goals of a cybersecurity risk program?
. What is the definition of "cybersecurity event".
. What is contained in an "Information Security Program".
. What is nonpublic information under an information security program?
. What is "publicly available information"?
. How do you approach creating a cybersecurity risk assessment?
. What does continuous monitoring mean?
. What Board of Director's oversight is required?
top of page
Learning Objectives
- Attendees will see how cybersecurity risk management is an evolving art.
- Attendees will understand risk assessment from the cybersecurity viewpoint.
- Attendees will have examples of cybersecurity risk management best practices.
- Attendees will know the components in an effective information security program.
- Attendees will have an approach to issues at third party providers.
- Attendess will have an example incident reporting and notification plan.
top of page
Key Issues on the Agenda
Introduction and Overview
. About Us and About Your Instructors
. Who are You?
. What are Your Needs?
. What is "Cybersecurity Risk"?
. This is War!
. Myths!
. Key Players in Cyber Risk Standards
Section 1 - Concepts and Definitions
. What is "Information Technology"?
. Risk Appetite
. Risk Tolerance
. What is an "Information Security Program"?
. What is "Non-Public Information"?
. Principles of Cybersecurity Risk Management
. SIFMA Principles of Cybersecurity Regulation
Section 2 - Initiating the Improvement of an Information Security Program (ISP)
. Implementation of an ISP
. SLCA - Creating the Appropriate Environment
. Where did the "Current State" come from?
. How good is our Risk Assessment?
. Objectives of an ISP
. What questions do you start with?
. Cyber Threats by the Numbers
. Oversight by the Board of Directors
. Key Principles of Cyber Risk Oversight per the NACD
. Oversight of Third-Party Service Providers
. Incident Response Plan
Section 3 - Define the Problems and Opportunities
. The Effects of "Moore's Laws"
. SLCA - Program Management
. The Usual Suspects - Cyber Security Issues
. Measuring the Maturity of Internal Controls
. Internal Breaches
. External Breaches
. Business Alignment Issues
. Governance and Leadership Issues
. Extended Ecosystem Issues
Section 4 - Deep Dive into The Issues
. Oversight by the Board of Directors
. Mission Statement - Explicit Values - Business Model
. Ethics
. Authorized Individuals
. User Access and Passwords
. Desktop Management
. Email Management
. Mobile Device Management
. "WiFi"
. Cyber Attacks
Section 5 - The Effective Information Security Program Management
. Program Adjustments
. How do we manage the Program?
. Project Scoping
. Governance
. Cybersecurity Domains
. Resources
Section 6 - The Information Security Program
. Risk Management
. Strategic Management Elements
. Tactical Management Elements
. Operational Management Elements
. Data Assets
. Security Policies
. Physical Security Items
. Personnel Security Items
. System & Application Items
. NIST System Security Plan Standards
. System & Software Life Cycle
. Configuration Management
. Training & Awareness Program
. System Documentation
. Disaster Recovery & Business Continuity
Section 7 - Review The Effectiveness
. Business Objective - Risks - Controls
. Program Adjustments
. Annual Certification
. What is Effectiveness?
. The InfoSec Maturity Model
. FFIEC Cybersecurity Assessment Tool
. Maturity Levels of the Internal Controls
. Inherent Risk Profile
. Technologies & Connection Types
. Online & Mobile Products & Technology Services
. Organizational Characteristics
. Inherent Risk Profile
. The Five Risk Response Domains
. How is your Cybersecurity IC Maturity?
. Cyber Risk Management & Oversight Domain
. Threat Intelligence & Collaboration Domain
. Cybersecurity Controls Domain
. External Dependency Management Domain
. Cyber Incident Management & Resilience Domain
. Innovative - Advanced - Intermediate - Evolving - Baseline Levels
. Cybersecurity Inherent Risk & IC Maturity Relationship
. Management Assessment Results
. Certification & Accreditation Program
Section 8 - Incident Response to a Cybersecurity Event
. Incident Response Plan
. Who is on the "Team"?
. Key Layers of Management's Response
. What are the "Goals" for the Team?
. The Skills - The World Class Response Team
. Preparation
. The Observe - Orient - Decide - Act (O.O.D.A.) Methodology in Detail
. Incident Response Procedures
. SANS Institute "Jumpbag" Recommendations
. Post-Event Recommendations
Section 9 - SOC for Cybersecurity - AICPA Standards and Guidance
. AICPA's Three Key Components
. AICPA - SOC for Cybersecurity Resources
. Difference Between Cybersecurity and Information Security
. AICPA Objectives
. Three Reporting Levels - Entity - Service Provider - Supply Chain
. Two Sets of Criteria
. Cybersecurity Program Descriptive Criteria
. Cybersecurity Program Control Criteria
. Trust Services Approach to COSO 2103
. Trust Services Additional Points of Focus within COSO 2103
. Trust Services Supplemental Criteria
. Components of the Cybersecurity Report
. Management's Description
. Management's Assertion
. The Practitioner's Opinion
Section 10 - Summary and Wrap-Up
. "Information Security Program" Defined
. "Reactive" or "Proactive"
. Your Keys to Success!
|
top of page
Seminar Schedule
Experts Providing CPE Training Events
Corporate Compliance Seminars (CCS) was created by experts who enjoy providing CPE training events. All our experts have years of experience in providing training courses, workshops and consulting on internal controls, internal auditing, information technology, cybersecurity and accounting related subjects. We have focused on SOX, COSO, PCAOB, COBIT, CMMI, GRC, GAAP, IFRS, AICPA, GAO, NAIC, ISO, and IIA Standards. We are your best source for continuing professional education (CPE).
Our programs, live in-person, webinar and on-demand, provide CPE for professionals with CPA, CGA, CIA, CFE, CISA, CMA and CA designations. CCS is focused on providing the best learning programs in using three distinct distribution channels: live in-person events, virtual webinar events and on-demand self-study e-learning.
Corporate Compliance Seminars presents CPE to a range of professionals, auditors, accountants, finance staff, compliance personnel, information technology (IT) professionals, Boards of Directors and Audit Committees. We examine the details of risk management, Sarbanes-Oxley Act compliance, Model Audit Rule (MAR) compliance, auditing, internal controls, cybersecurity and compliance, and fraud prevention and detection.
Within the U.S.A. marketplace, Corporate Compliance Seminars allows the attendee to earn NASBA CPE credit.
Our events focus on the details of the Sarbanes-Oxley Act of 2002 (SOX), Internal Controls over Financial Reporting (ICFR), Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control Frameworks, ISACA's Control Objectives over Information Technology (COBIT), Information Technology Infrastructure Library (ITIL), Open Compliance & Ethics Group's (OCEG) Governance, Risk & Compliance (GRC) methodology, PCAOB's Auditing Standard 5 (AS5), AICPA auditing standards, and NAIC regulatory model regulations and acts .
Our live in-person events are generally presented in a small classroom setting with two to five attendees. Over the last few weeks, we have come to the understand we need to provide distant e-learning events. We are now in the process of moving all our content to an online available status. We have created distant e-learning opportunities using both a virtual webinar event approach and on-demand e-learning self-study modules. These two e-learning approaches: webinars and on-demand self-study with extended web access to our content into the global continuing professional development (CPD) marketplace. In the webinar e-learning events we will limit the number of students to maximize the interaction between the live instructor and attendees. The on-demand self-study e-learning modules will be created and offered to meet the NASBA CPE credit requirements .
Our seminars provide CPE for the CPA, CFE, CIA, CISA, auditors and others with effective and engaging internal audit training courses.
Our instructors have had direct experience in the following industries: financial activities, bank, insurance, healthcare, construction, leisure and hospitality, professional and business services, mining and oil & gas extraction, manufacturing, educational, government agencies, transportation, software, technical, hi-tech and agricultural.
top of page
|
|
 |