Cyber Security Operations Manager

8 March 2021 to 12 March 2021
Dallas, TX
3 Certificates Available
Days
Hours
Minutes
Seconds

World’s #1
Cyber SecurityEducation & Certification Seminars

TechXact, the global leader in Audit and Certification, and the largest provider of Professional Cyber Security Training Seminars, is hosting the next IDCA Training and Certification Seminars for the Management Route on 8 March 2021 in Dallas, TX.

Cyber Security Operations Manager®

5 Days. 3 Professional Certifications.

( + )

This course targets Professionals who are engaged with operational aspects of live and running applications and the application ecosystems. From incident management planning to identity and access management, secure live applications, keeping out cyber attackers, to capacity planning, enhancement and upgrade management, risk mitigation and migration, HR roles and responsibilities, vendor and contract management of security service level agreements (SSLAs) are all covered and effectively outlined in the program. The CSOM® produces distinguished cybersecurity operational managers, architects, service providers and mentors and enables them to have leading roles in Cybersecurity Operations.

JOIN THE CYBER SECURITY PROFESSIONALS

IDCA is Global Reach. Local Delivery.

idcareferences
IDCA has designed the cyber security training course modules in a unique manner, covering a wide range of cloud topics, which are accompanied by live examples, hands-on case studies, and group activities. Classes can be attended in-classroom, virtual and online, at public venues as well as private sessions available to enterprise groups.

SCHEDULE

Great Networking opportunity with the industry's Elite. All courses include daily lectures, coffee breaks, beverages, lunch buffets, examination and certification.

Breakfast
team-10
Introduction and Overview
  • The outset of Cybersecurity
  • Governance
  • Risk Integration
  • Legislative Requirement
  • Security Requirement
  • Internal Threats
  • External Threats
  • Physical Security Threats
  • Cybercrime: Leading Business Risk Globally
  • Major Cyber Breaches
  • Cybersecurity Complexity
  • Infinity Paradigm
  • Definition of Cybersecurity
  • Cybersecurity Principles
Coffee Break
team-10
Cybersecurity Principles
  • The Layers
  • The Four Principles
  • Principle 1 & its key Activities
  • Principle 2 & its key Activities
  • Principle 3 & its key Activities
  • Principle 4 & its key Activities
  • Cybersecurity Attack
  • Security Threat to Networks
  • Two types of Attacks
  • Stages of an Attack
  • Cybersecurity Defense
  • Layered Security & Configuration of Perimeter
  • Firewall
  • Intrusion Detection & Penetration System
Lunch
team-10
Cybersecurity Risk & Consequences
  • Consequences of Attack
  • Maturity
  • Culture Shift
  • Appetite
  • Advice
  • Putting a Price on Risk
Coffee Break
Breakfast
team-10
Cybersecurity Trends
  • Understanding the threat landscape
  • Common Threat Agents and Vulnerabilities
  • Zero-Day Vulnerabilities
  • Attributes of Cyber Attack
  • Understanding the attributes of an Attack
  • Malware & Types of attack
  • Obfuscation and Mutations in Malware
Network Access Control & Wireless Network Security
  • An Overview of Network Access Control (NAC)
  • NAC Policies
  • The Network Access Control/Network Access Protection (NAC/NAP) Client/Agent
  • The Enforcement Points
  • Enforcement Point Action
  • Authentication and Authorization
  • NIST & Cybersecurity
  • ISO 27001 For Information Security
Coffee Break
team-10
Weaknesses of Existing Cybersecurity Standards
  • Available standards
  • Weaknesses of existing standards
  • Why IDCA is critical to filling the gaps
Cybersecurity in Cloud
  • Types of Cloud Assets
  • Compute Assets
  • Storage Assets
  • Network Assets
  • Asset Management Pipeline
  • Procurement Leaks
  • Processing Leaks
  • Finding Leaks
  • Protecting data in the cloud
  • Tokenization
  • Encryption
Cybersecurity for IoT and Edge/or 5G Computing
  • IoT Security Challenges & Landscape
  • Why IoT Security devices are targeted
  • Edge Motivation
  • Edge Definition
  • Evolution of IT Computing Models
  • Advantages of Edge Computing
  • Edge Layered Stack
  • OWASP (Open Web Application Security Project) Top 10 Internet of Things
Lunch
team-10
Examination Preparation
CSIS Examination
Breakfast
team-10
Cybersecurity Overview
  • Cybersecurity Complexity
  • Malware & Types of Attacks
Governance
  • Governance Objectives
  • Governance for Cybersecurity
  • Effective Cybersecurity Programme Governance
  • Cybersecurity Governance: Effective Versus Ineffective
  • Cybersecurity Governance Activities
  • Cybersecurity Organizational Structure
Risk Management
  • Cybersecurity Risk oversight of the Board
  • Cybersecurity Risk management Principles
  • Cybersecurity Risk Policies & Procedures
  • Cybersecurity Risk Strategic Performance Management
  • Cybersecurity Standards & Frameworks
  • Cybersecurity Risks: Identify, Analyze and Evaluate
  • How to treat Cybersecurity Risk
  • Using Process Capabilities to Treat Cybersecurity Risks
  • Using Insurance and Finance to Treat Cybersecurity Risks
Coffee Break
team-10
Physical IT-Related Asset management: Acquisition, Development & Maintenance
  • Build, Buy or Update: Embedding Cybersecurity Requirements and Establishing Best Practices
    • Governance & Panning
    • Development & Implementation
    • End of Useful Life and Disposal
  • Specific Considerations
    • Commercial Off-the-Shelf Applications
    • Cloud/SaaS Applications
    • Physical Security
      • Commit To a Plan
      • Physical Security Risk Landscape View and the Impact on Cybersecurity
      • Manage/Review the Cybersecurity Organization
      • Design/Review Integrated Security Measures
      • Data Center Scenario Reworked
      • Understanding Objectives for Security Measures
      • Understanding Controls for the Data Center Scenario
      • Calculate/Review Exposure to Adversarial Attacks
      • Simulating the Path of an Adversary
      • Calculate the Probability of Interrupting & Disrupting the Adversary
      • Optimize Return on Security Investment
Lunch
team-10
Vulnerability Identification and Management: Treating Cybersecurity Risks
  • Introduction
  • Cybersecurity Risk Treatment in Line with Organization’s Risk profile
  • Determine Cybersecurity Risk Profile
  • Cybersecurity Risk Treatment
    • Focus on the Crown Jewels
    • The Weakest Link: Humans
    • Preventive Measures Along Side Detective Measures
    • Ability of the Organization to Respond Must Remain the Focus
    • Cooperation Remains Essential
  • Alignment of Cybersecurity Risk Treatment
  • Cybersecurity Risk Treatment Practice
    • Business-As-Usual: Integrated into Enterprise Risk Management
    • Business-As-Usual: Integrated with the Regular Three Lines of Defense Applies for Model
    • Business-As -Usual: Managing Risk with Predefined Risk Appetite
    • Business-As-Usual: Using the Embedded Risk Management Processes
    • Business-As-usual: Treatment of Cybersecurity Risks
Coffee Break
team-10
Threat Identification & Handling Management: Identify, Analyze & Evaluate
  • The Risk Landscape
  • The People Factor
  • Assessing & Managing Risk: A structured Approach
  • Cybersecurity Culture
  • Regulatory Compliance
  • Maturity Compliance
  • Protection Prioritised
Breakfast
team-10
Cybersecurity Incident and Crisis Management
  • Cybersecurity Incident Management
  • When to declare a Cybersecurity Event an Incident
  • How to qualify the two categories of Incident Sources
  • How to follow the Incident Management Policy and Processes
  • Incident Handling
    • Types of Incident
    • Incident handling Process Planning
    • Collect and Protect Incident Information
    • Identification
    • System and Network Logging Functions
  • Integrating Incident Reporting into Enterprise Risk Management (ERM)
  • Cybersecurity Crisis Management
    • From Incident Management to Crisis Management
    • Operating Principles of Crisis Management
    • Operationalising Cybersecurity Crisis Unit and its Structure
    • Tools & Techniques for Managing Cybersecurity Crisis
    • Cybersecurity Crisis Management Next steps
Coffee Break
team-10
Integrating Cybersecurity & Business Continuity Management
  • What is Business Continuity
  • ISO 22301 Overview
  • BCM Lifecycle
  • Understand/Analyze the organization and Integrate with Cybersecurity
  • Determine BCM Strategy & Integrate with Cybersecurity
  • Developing and Implementing BCM Responses, Integrate with Cybersecurity
  • Exercising/Validating BCM and integrate with Cybersecurity
  • BCM Policy & Programme Management
  • Embedding BCM in the organizational culture
Lunch
team-10
Organizational Structure
  • Cybersecurity and The Internal Organizational Structure
  • Standards & Guidance Approaches
  • Cybersecurity within the Enterprise
  • Adapting Cybersecurity to address Enterprise Exposures
  • Designing own Cybersecurity Risk Function Operating Model
  • The Enterprise Function Roles most involved in Cybersecurity across the Enterprise
  • Aligning Cybersecurity within the Enterprise Functions
  • Governance & Risk Oversight Functions for Cybersecurity
  • Cybersecurity and Executive Management Functions
  • Cybersecurity Draws Support from Other Enterprise Management Functions
Coffee Break
team-10
Human Factors and Culture
  • Organizations as Social Systems
  • Cybersecurity More Than a Technology Problem
  • Organizational Culture
  • Cybersecurity and Human Factors
  • Insider Threats
  • Social Engineering Threats
  • Training
  • Frameworks and Standards
    • ISO 27001: 2013
    • Business Model Information Security (BMIS)
  • MSIT Framework
    • Human Factors & Technology Trends
    • Measuring Human Behaviours for Cybersecurity
    • Cybersecurity Due to Human Errors Can Be Reduced
The Application Ecosystem
Breakfast
team-10
Application Security
  • Application Development Security
    • Application Based Attacks
    • Web Based Attacks
  • Standardization of Application Security Features
    • Techniques to Enforce Application Security
    • Secure Code Design
    • Code Reviews
    • Secure Configuration
    • Testing for Loopholes
    • Constant Patching
  • Practical Cybersecurity Mitigants
    • Endpoint Security
    • Ransomware
    • Ransomware Mitigation
    • Spyware and Adware
    • Spyware and Adware Mitigation
    • Trojan Horses
    • Trojan Horses Mitigation
    • Viruses
    • Viruses Mitigation
Cybersecurity Considerations for the 7-Layers of the Application Ecosystem
  • Application Layer
  • Platform Layer
  • Compute Layer
  • Information Technology Layer
  • Site Facility Infrastructure Layer
  • Site
  • Topology
Application Ecosystem Management: Cybersecurity Day-to-Day Operations
  • Controls Management
  • Security Controls
  • Asset Management
  • Change Management
  • The Importance of Managing Change
  • When should Changes be Made?
  • What are the Impact Changes bring?
  • The safeguard Effect of Internal Control in Change Management
  • Organizational Change Management
Coffee Break
team-10
Access Control
  • Access Control & A New Perspective
  • Organizations requirements for Access Control
  • User Access Management
  • User Registration and Deregistration
  • Access Provisioning for Users
  • Privileged Access Rights Management
  • Users Secret Authentication Information Management
  • User Access Under Review
  • User Rights: Removal & Adjustments
  • Responsibility of Users
  • Application & System Access Control
  • Access Restriction to Information
  • Procedures for Secure-Logins
  • Password Management System
  • Privileged Utility Programs Usage
  • Program Source Code & Controlled Access
External Context & Supply Chain
  • Overview
  • Supply Chain Support Strategy
  • Planning How to Create Supply Relationships
  • How to Identify Competent External Suppliers
  • Relationship Management
Maintaining Situational Awareness
  • Overview
  • Situational Awareness Plan
  • Situational Awareness Process
Cybersecurity Service Level Agreement
  • Overview
  • Purpose
  • Attributes
  • General Parts of SLA
  • SLA Service Performance
  • SLA Constraints & Service Management
  • SLAs Dos & Don’ts
Lunch
team-10
Examination Preparation
CLOS Examination
IDCA recognizes and utilizes competencies of wide range of international standards that are specific to their domains, such as International Organization for Standardization (ISO), Cloud Standards Customer Council, National Institute of Standards and Technology (NIST), Distributed Management Task Force (DMTF), The European Telecommunications Standards Institute (ETSI), Global Inter-Cloud Technology Forum (GICTF), International Telecommunications Union (ITU), Open Grid Forum (OGF), Open Cloud Consortium (OCC), OpenCloud Connect, TM Forum, Organization for the Advancement of Structured Information Standards (OASIS), etc

Book our virtual sessions now to get instant 5% off this event.

Save & Share Cart
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)