Despite heightened attention and unprecedented levels of security investment, the number of cyber incidents and their associated costs continues to rise. The concern typically revolves around the growing sophistication of malicious hackers and other adversaries, and whether being secure is even possible in today’s rapidly evolving landscape of cyberattacks. Cybersecurity is a broad and ever-evolving discipline. As organisations seek to protect their organisations, it is important to understand how attackers typically achieve their objectives and the cybersecurity capabilities that any organisation should consider building in order to respond to these threats. In this session, we will discuss the following:

  • Anatomy of a cyberattack – introducing the cyber kill chain and the steps attackers take to achieve their objectives
  • Responding to cyberattacks – layered defence and cybersecurity capabilities, and the shift from prevention to detection
  • Cybersecurity capabilities – introducing cybersecurity capabilities and the key features of each capability. These capabilities include cybersecurity management, extended enterprise, application security, infrastructure security, identity and access management, data security and data leakage prevention, threat intelligence, security operations, vulnerability management, incident response and business resilience

 

Learning Outcomes

  • Review the anatomy of a cyberattack – introducing the cyber kill chain, and the steps attackers take to achieve their objectives
  • Respond to cyberattacks - layered defense and cyber security capabilities, and shift from prevention to detection
  • Identify Cybersecurity capabilities and the key features of each capability

 

Target Audience

  • Aspiring, New and Experienced Directors
Virtual Classroom Format
Interactive Facilitated Learning
ICDM Virtual Classroom
16 Jun 2020
9:00 AM - 1:00 PM
Ho Siew Kei
Share: ShareLinkedinLinkedinLinkedin
Tuesday | 16 June 2020 (Facilitator: Ho Siew Kei)

 

Course Overview:

Module OneBackground to cyber-attacks30 minutes
Module TwoAnatomy of a cyber-attack & cyber kill chain45 minutes
Module ThreeCase studies: examples of cyber-attacks from the viewpoint of the cyber kill chain30 minutes
Module FourIntroducing cybersecurity capabilities30 minutes
Module FiveDescribing the features of core capabilities45 minutes

*The duration excludes introduction & housekeeping and virtual breaks

Methodology
Lecture, case-studies, discussion, polling

Speaker

HO SIEW KEI
HO SIEW KEI
Executive Director, Risk Advisory – Cyber Risk, Deloitte Malaysia