From 06 May 2018 to 09 May 2018    International Foundation Level for Compliance Officer Function    in Cairo / Egypt

Cyber and Information Security Management

Objectives

At the end of the seminar, participants will have an overview of the subject and will be exposed to this issue which will guide their choices and their mission taking into account the risks associated to cyber security.

For this purpose, they will:

  • cover the different areas of the Cyber-Security
  • obtain user security concepts - individual behavior (passwords, email, mobile, social networks) and basic knowledge of Internet security
  • understand how an attack happens
  • review the security environment and regional regulatory and specificities of the financial sector (Monétique, PCI DSS, mBanking, eBanking)
  • review the ethics and standards related to Internet Safety
  • obtain answers the following questions:
    • What is the purpose of Cyber-Security?
    • How to manage security?
    • What are the security controls and defenses?
    • What are the means to respond to security incidents?

Target Group

Directors and managers of  IT, security, risk and compliance departments within banks, financial institutions, central banks or supervisory bodies.

Location & Duration

In HoT-ATTF partner countries: 3 seminar days - available in English and in French

Detailed programme Explode

 What are the threats?

• Understand how an attack occurs

• Attacker profiles

• What is the purpose of Cybersecurity?

• Cybersecurity Basics: Basic Triad, Notions of Risk, Threat, Vulnerability, Impact

• The return on investment of security

• How to manage security?

• Security policies

• Ethics and Standards PCI-DSS

• Security Incident Management

• Infrastructure and communication security

• Security Operation Center (SOC) -Computer Security Incident Response Team (CSIRT)

• The specificities of the financial sector (electronic banking, mBanking, banking, interconnection ...)

• Software security

• User security concepts -individual behavior

(password, email, mobility, social networks)

Join us on  Follow us on LinkedIn Follow us on Twitter