You are on page 1of 2
Nod TECHNICAL TRAINING > CIRT TRAINING The average higher end cost of external and internal attacks yet ef for Executives 29th & 30th September SOFITEL DOWNTOWN, DUBAI Cyber Incident Response Training Tustin, and value from, inforn UAE Chapter ingle breach is now £3.14 million. Organisations continue to suffer from tive Incident management is an afterthought in most companies. This course shares some of the most up to date methods of preparing and responding to cyber attacks, We introduce you to Intelligence led testing, a combination of traditional penetration testing and threat intelligence thatwill equip you with the necessary knowledge to respond agai to sophisticated cyber-attack scenarios. Unlike others, CMA offers t state-of-the-art real world attacks on critical assets and improve and test your resili attendees the opportunity to learn from experienced professionals who are practitioners, rather than trainers, with years of experience and knowledge. > YOU WILL UNDERSTAND ‘The latest techniques and insight on incident response. Threat Intelligence led testing and response framework adopted by leading governments and institutions. dentification, Exfiltration or Manipulation of Data Balance of Identification, exfiltration vs. manipulation. Pre-attack Research, Reconnaissance and Target Selection. Planning and Preparation of Attack Components, The business impacts of cyber breaches and real-w filtration and Post-infltration Entrenchment, rid cyber attacks SIEM, Analytics & Entity based anamoly detection and how to use it for effective response. When discussing cyber security with your CSO, ask one question “How swiftly can ver from a cyber attack?” v Too often the technical team leads the organisation's response with devastating consequences. v Damage to Brand & Reputation Financial Fines due to regulatory non compliance For registration contact: workshop@isacauae.org info@cm-alliance.org | www.cm-alliance.org CYBER MANAGEMENT ALLIANCE SPE! RAMI . - Understand what really matters in cyber space. - Examine the real risk exposure posed by cyber space. ~ Review some of the most recent and damaging cyber attacks impacting companies. - Understand the impact of Internet of Things, social media and mobile smart computing - Understand and examine the latest regulations and why you need to ~~ Why Attend: THE ATTACK & RESPONSE Attack strategies - Threat attackers - Motivation deep dive - Incident analysis & forensics FRAMEWORK & STANDARDS - Key Ingredients - The framing of the standard - One more key Ingredient comply now or else face possible fines of several million Pounds. \ - Implementing the Framework The two day session is concluded with one or more scenario based workshops where all the knowledge gained is applied and tested. = = — CYBER INCIDENTS - REAL EXAMPLES & RESPONSES + Cyber Incidents (real examples) = The dynamics of a cyber incident - Why Cyber is different than a =~ INTELLIGENCE LED INCIDENT RESPONSE - Detailed why and how - Actionable Threat intelligence - Demonstration of how to prepare for the upcomi CONCEPTS, METHODOLOGIES & -_FEGHNaUES Detail Anatomy of an Attack Basic & Advanced Attacks - Introduction to intelligence attack lead incident response Ne INCIDENT OPS THE LAW THE CHECKLIST regular incident - Integration operations into effective incident operations - Its about the operations team managing expectations - Skilling and training = The Legal Implications + Jurisdictional Problems with cyber Crime + Legal Imperatives vs “Nice to have" a STAKEHOLDERS: WHO ARE THEY? - What and Why? -We are not alone! - Building an effective & agile stakeholder PEOPLE: PROBLEM OR OPPORTUNITY = The Skills & Capabilities Matrix - Manage & Document Response Processes - Building the A,B & C teams Ee - Creating/ adopting the checklist Incident management checklist - Using the check list to beat the hackers! ADDITIONAL - More than just technology The integrated business approach} Importance of Risk Management - Public Relations For registration contact: workshop@isacauae.org info@cm-alliance.org | www.cm-alliance.org CYBER MANAGEMENT ALLIANCE SPECTRAMI SS

You might also like