Goals
At the end of the training, the participant will be able to understand all the aspects to take into account in the management of the IS security of his company.
Program
-> Problem and observation
-> Why are SMEs the favorite prey of hackers?
-> How is an attack?
-> What are the immediate consequences of an attack?
-> What are the long-term consequences?
-> Solutions for SMEs
- Establishment of a security policy within an SME
- Staff training
- Importance of data backups
- Mutualize the risks
- Subcontracting in terms of security
- Delegation of responsibilities
- Cyber security agencies
-> Define in practice a security policy adapted to your SME
- Identify assets and critical data (Business Impact Analysis)
- Modeling attacks and risk assessment (threat modeling and risk assessment)
- Understanding risk aversion, how much risk are we willing to take?
- Business continuity plan
- Compliance and standards (ISO 27001, ISO 22301)
- Training staff at all levels to educate them about safety
- Test IT systems periodically (pentests), as well as staff (physical intrusion tests)
- Set up a dedicated person or team (CISO)
-> What to do after a security incident
Where does it take place?
House of Training
7
Rue Alcide de Gasperi Luxembourg
You could like it :
find out about all the networking events and trainings tailored for you!
find out about all the networking events and trainings tailored for you!