Cyber Security Awareness for Business & Risk Management

Course Overview

Employees play a major role in business. Educate your employees on how to fortify the human element of your company’s security is through cybersecurity awareness training. The training helps businesses decrease desk costs, protect their reputation, and secure their overall cybersecurity investment. The training keeps employees fresh on how to protect themselves online, and make them aware of new, emerging threats and attack techniques.

Who is this course for?

This course is specifically for those whose companies are nominated as Critical Information Infrastructure Providers in the Marine, Shipping, Refinery, FPSO, Manufacturing, Shipyard, Construction and oil and gas.

  • Leadership and senior management to gain intimate understanding of the mechanics in which hackers can compromise their enterprise data, enabling them to make informed decisions in designing projects and processes
  • Company-wide employees aiming for Cybersecurity literacy and adhere to Cybersecurity best practices and deployment

This training promotes the slogan “Surf Safe “.

Duration: 7 hrs

Mode of Delivery: Trainer led Virtual live session

Prerequisite: none

Learning Outcome

  • Awareness to secure data with intimate understanding and implementing secured practices in everyday workplace.
  • The role of cybersecurity in a modern digital economy
  • Practical issues relating to the governance and management of cyber security, the different cyber security controls, process, and the standards available.
  • Related laws that govern this area such as Cybersecurity Act (2018) and Personal Data Protection Act (2012) and related legislation

Course Outline

Common Cyber Threats: Indicators and Countermeasures that includes Phishing, Malicious code, Weak and Default Passwords, Unpatched or Outdated Software Vulnerabilities and Removable Media

Study of a Computer Intrusion: The topic explores on the anatomy of intrusions that encompasses Reconnaissance, Intrusion into the network, obtaining user credentials, Establishing a backdoor and Data exfiltration

Cyber Threats and Their Targets: Walk through on what is the human risk involved. Reporting Needs and Instances & Cybersecurity Best Practices

Understanding different Cybersecurity Law & other regulations: ICLG – Singapore, GDPR – Europe’s General Data Protection Regulations, CCPA – California Consumer Privacy Act, SOX compliance

Famous Attacks – A case study.

The training comprises Highly participative and interactive group discussions, practical exercise, critique sessions, handouts, course templates and case studies