You are on page 1of 5

CYBER SECURITY AND FRAUD ANALYTICS

Create a Cyber Security Program to Protect your Organisation’s Assets

IN-PERSON: 7 - 10 JUNE 2021 | 1 - 4 NOVEMBER 2021 24 HOURS

LIVE ONLINE: 27 - 29 JUNE 2021 | 16 - 18 NOVEMBER 2021 16.5 HOURS

Steve Blais
By attending this course, you will learn: International IT Expert

How to identify cyber security threats to businesses and personal lives


What cyber security counter measures they can employ to protect against the threats
The various cyber security techniques such as cyber forensics, malware analysis, offensive and defensive security, and more
The state of the art in fraud detection and protection
How analytics are used through diagnostic models and behavioral analytics to detect fraud in financial and other institutions
How to use analytics to identify the “insider” in your organization who may be assisting in fraud and other malicious intrusions
What the future holds in cyber threats and cyber security defenses especially in the area of fraud detection and protection

SPECIAL OFFERS
AVAILABLE
COURSE INFORMATION
COURSE OVERVIEW FORMAT FEATURES LIVE ONLINE IN-PERSON
Location Online Dubai, UAE
The threat of cyberattack and subsequent breach of electronic defenses is ever present for
today’s global and local organizations. While the general threats of hackers which cause Duration 3 days 4 days
damage through unauthorized access to an organizations’ computer networks, services and Learning Hours 16.5 hours 24 hours
programs still exist and are getting more sophisticated, the biggest threat to organizations is Timings 10:30 - 16:00 GST (GMT +4) 8:30 - 14:30 GST (GMT +4)
that of computer assisted fraud, such as Ransomware, identity theft, insider abetted theft, Certificate Digital copy Hard copy
embezzlement and so forth. The main attraction of computer fraud to malevolent actors and
Digital Badge
organized crime is the monetary gains it produces for very little investment, and the high
probability of never getting caught. Material Digital copy Hard copy
Discussions, Case Studies & Exercises Deeper dive
This highly interactive course focuses on the current state of cybersecurity including advanced Live Interaction With Course Experts
persistent threats and how to protect against computer assisted fraud such as Ransomware. Networking With Peers
The course details the use and application of descriptive and predictive analytics to detect
Lunch & Learn
fraudulent activities and protect the organization against loss due to fraud. The outcome of
the course is to ensure the participants understand how to set up a digital resilient Program Technical Support
organization.

The participants will engage in interactive exercises around a case study that will help all REQUIREMENTS AND CERTIFICATES
participants understand the state of their industry in terms of fraud threat and the use of Delegates must meet two criteria to be eligible for an Informa Certificate of
fraud analytics to defend against that threat as well as the cybersecurity countermeasures Completion for a course:
available to combat fraud. 1. Satisfactory attendance – delegates must attend all sessions of the course.
Delegates who miss more than 2 hours of the course sessions will not be eligible
to sit the course exam
LEARNING STYLE 2. Successful completion of the course assessment.
Participants will engage in individual exercises around a case study involving security Delegates who do not meet these criteria will receive an Informa Certificate of
issues and a typical company. Some of the exercises will be based on their own Attendance. If delegates have not attended all sessions, the Certificate will clearly
companies and result in information that can be applied to their own organization. state the number of hours attended.
Group work or table exercises using flip chart or white boards will focus on the case
study problem and provide an opportunity to engage with small groups of other
participants to jointly resolve the problems of the case study. There are a number of WHO SHOULD ATTEND
discussion exercises in which the participants and instructor can share information Security professionals wishing to expand their view of cybersecurity or fraud analytics
about cyber security threats and countermeasures as well as fraud threats and the
application of analytics in various industries to prevent or detect fraud. Managers wishing to understand the concepts of present-day cybersecurity
mechanisms and the application of fraud analytics

COURSE SCHEDULE Data scientists and data analysts looking to use their expertise in the constant fight
against internal and external computer-based fraud
Live Online: This Live Online course will commence at 10:30 and conclude at 16:00
GST (GMT+4), each day. The daily schedule will consist of three sessions, with two
breaks of 30-minute duration between the sessions.
In-Person: Registration will be at 08:00, on Day One. The course will commence at COMPETENCIES
08:30 and end at 14:30. There will be breaks for refreshments and lunch will be served Cyber security Fraud detection
Cyber forensics Machine learning
at the end of each day’s session.
Cyber threats Descriptive and predictive analytics

T: +971 4 408 2894 | E: register-mea@informa.com | www.informa-mea.com


COURSE OUTLINE
MODULE ONE Specific types of fraud in industries
Chapter 1: Cybersecurity overview and threat assessment Legal remedies for fraud today
What is cybersecurity?
Discussion: Examples of fraud both individual and corporate
The cyber threat landscape today
Discussion: Examples of fraud by industry
Advanced persistent threats
Behind the cyber threat landscape Class exercise: Vulnerability of case study organization to fraud exploits
Cyber threat security countermeasure model
The concept of digital resilience Chapter 5: How fraud is perpetrated: Individual
Individual fraud and identity theft
Discussion: What is cybersecurity? Robo calling, masquerading, and computer existed phone fraud
Discussion: What are the threats? Phishing and spoofing
Exercise: Which threats apply to me? Social engineering
Exercise: How would you know? What are the tell-tale signs or indicators? Ransomware
Class exercise: Assessment of an organization’s security stance using the case study
Discussion: Examples of individual fraud
Chapter 2: Principles of cybersecurity Discussion: Social engineering and fishing exploits
General principles Discussion: Reaction to Ransomware
Authentication and authorization and biometrics
Class exercise: Organizations vulnerability to Ransomware
Fraud and masquerade and the man in the middle
Data protection and encryption
Denial of service Chapter 6: How fraud is perpetrated: Organizational
Organizational fraud and masquerading
Discussion: Application of the general principles Phishing and spoofing
Discussion: Creating an unbreakable password Social engineering
Discussion: Biometrics Ransomware
Class exercise: Apply the principles of cybersecurity to the case study Money laundering
Forgery
Chapter 3: The ever-changing perimeter General masquerading
Expanding the perimeter with the Internet of Things
The moving perimeter: mobile computing and BYOD Discussion: Organizational fishing and spoofing
The continued and expanded threat of the insider Discussion: Organizational protections against social engineering
The unseen perimeter: cloud and virtual Discussion: Use of behavioural analytics to detect or prevent fraud
The new technology perimeter: Blockchain adopted technologies
Class exercise: Case study organizational vulnerability to money laundering and protections
against money laundering
Discussion: Threat of the Internet of Things
Discussion: Bring Your Own Devices policies
Class exercise: Threat of the insider for case study organization and use of behavioural analytics MODULE THREE
to detect insider fraud Chapter 7: Overview of analytics and machine learning
Discussion: Cloud and virtual computing threats Data analytics, mining and business intelligence
Class exercise: Evaluating the case study organization in terms of the expanded perimeter Types of analytics
Use of analytics for fraud detection
MODULE TWO Machine learning algorithms
Chapter 4: The expanding universe of computer fraud Application of machine learning for fraud detection
Classic definition and execution of fraud
Examples of individual and corporate fraud Discussion: Use of the various types of analytics in cybersecurity
Discussion: Extent of the use of analytics in industries today

T: +971 4 408 2894 | E: register-mea@informa.com | www.informa-mea.com


COURSE OUTLINE
Chapter 8: How does analytics work? Chapter 12: Industry good practices
The analytics cycle Cybersecurity and fraud analytics summary and review
Creating an analytics model Good practices in cybersecurity
Running the test and validation cycles Good practices in fraud analytics
Using predictive analytics to anticipate fraud Good practices for use of machine learning in fraud detection and prevention
Final words of wisdom
Discussion: Application of the analytics cycle
Class exercise: Applying the analytics cycle to the case study organization
Class exercise: Create an analytics model for the case study organization to detect or
fraudulent behaviour MEET YOUR COURSE EXPERT | STEVE BLAIS
Chapter 9: How does machine learning work?
The specifics of a fraud analytics model International Trainer | Consultant | Author | Analyst
Applying machine learning models
Refining the model and the data Steve Blais, PMP, PMI-PBA, is an international Trainer, Author,
Model and data enrichment Consultant and Coach who has over 50 years’ experience in
Using machine learning to improve predictive analytics
information technologies working as a Business Analyst, System
Analyst, Information Security Analyst, Quality Assurance Analyst,
Discussion: The general application of machine learning to cybersecurity and fraud threats
Programmer, Project Manager, and General Manager.
Class exercise: Create a machine learning model for case study organization to predict
potential fraud
Discussion: Conditions for refining or enriching the model He spent twenty years working as a Contractor in Washington DC for many US Federal
government organisations in various roles. He also worked as a Technical Manager and
MODULE FOUR Consultant to a number of financial organisations in the US and Europe. In the 1990s,
Chapter 10: Risk management he developed several disaster recovery plans for different government and civilian
Understanding the risks organisations, and wrote the five-year defence plan for the Strategic Defense Initiative
Understanding the limits of protection Organization (SDIO) which outlined the disaster recovery plans and procedures. He has
Analytics, machine learning, and artificial intelligence as security threats also worked with several Middle Eastern organisations, both government and
Incident management commercial, in helping them develop business continuity plans for various industries
Class exercise: Define the risks and obstacles of employing analytics and machine learning for and information technology companies.
fraud detection and prevention in the case study organization
Discussion: The limits of analytics and machine learning in terms of fraud detection and protection Steve writes a monthly column for Business Analyst Times and is a frequent contributor
Discussion: The risks of using analytics and machine learning for fraud detection and prevention to AllpM.com, Modern Analyst and other publications. He has presented the keynote
Class exercise: Creating a fraud oriented incident reporting system for the case study organization addresses at business analyst conferences around the world in 2019, the IPMA
European Conference (2013), the PMI Pacific Rim Conference in Tokyo (2012), and the
Chapter 11: Achieving digital resilience PMI South America Conference in Sao Paolo (2011).
The holistic cybersecurity program
The data analytics organization and governance He is also the author of Business Analysis: Best Practices for Success (John Wiley, 2011)
Integrating analytics and machine learning into the organization
and co-author of Business Analysis for Practitioners: A Practice Guide (PMI, 2014) and a
What a digital resilience organization looks like
member of the core team for A Guide to the Business Analysis Body of Knowledge®
(BABOK® Guide), v.3 (IIBA, 2015). His new book on the future of business analysis will
Discussion: A holistic cybersecurity program
Class exercise: Modifications to the case study organization to create a digital resilience be released in 2020.
organization

T: +971 4 408 2894 | E: register-mea@informa.com | www.informa-mea.com


CYBER SECURITY AND FRAUD ANALYTICS
LIVE ONLINE: IN-PERSON:
Book Before Book Before
Date Final Fee Date Final Fee
29 March 2021 3 May 2021

27 - 29 June 2021 (BW680V) US$ 1,790 7 - 10 June 2021 (BC8516) US$ 4,195 US$ 4,695 US$ 5,195

Book Before Book Before


16 - 18 November 2021 (BW609V) US$ 1,790 Date Final Fee
24 August 2021 27 September 2021

Pricing excludes 5% VAT, charged where applicable.


1 - 4 November (BW609V) US$ 4,195 US$ 4,695 US$ 5,195
Delegates who attend all sessions and successfully complete the assessment, will receive an Informa
Certificate of Completion. The Certificates will be awarded in soft-copy. Pricing excludes 5% VAT, charged where applicable.

Course fees include documentation, luncheon and refreshments. Delegates who attend all sessions
and successfully complete the assessment, will receive an Informa Certificate of Completion, in hard
FOR SPECIAL OFFERS AND DISCOUNTS: copy.

Call: +971 55 176 0524 About Informa AllSecure


Email: a.watts@informa.com
Visit Website: www.informa-mea.com/training/special-offers Informa AllSecure is Informa’s approach to enhanced health and safety
standards at our events following COVID-19.
From trainers to delegates, speakers, visitors and journalists, those who
WANT TO RUN THIS COURSE IN-COMPANY? come to our events come to connect, learn, know more and do more
business, effectively and safely.
Call: +971 4 407 2624
Email: cts@informa.com The standards and practices that make up Informa AllSecure are designed to provide confidence that at
this event, we are striving to provide the highest standards of safety, hygiene, cleanliness and quality.
Read more about it here: www.informa-mea.com/allsecure/
REGISTRATION, PAYMENTS AND CANCELLATION

All registrations are subject to our terms and conditions which are available at www.informa- AVOID VISA DELAYS – BOOK NOW
mea.com/terms. Please read them as they include important information. By submitting your
registration, you agree to be bound by the terms and conditions in full. All registrations are subject Delegates requiring visas should contact the hotel they wish to stay at directly, as soon as possible.
to acceptance by Informa Middle East which will be confirmed to you in writing. Visas for non-GCC nationals may take several weeks to process.

A confirmation letter and invoice will be sent upon receipt of your registration. Please note that full
MC/SM | IT © Copyright Informa Middle East Ltd
payment must be received prior to the event. Only those delegates whose fees have been paid in
full will be admitted to the event. For full cancellation details, please visit www.informa-
mea.com/terms

All cancellations must be sent by email to register-mea@informa.com marked for the attention of
Customer Services Cancellation. Due to unforeseen circumstances, Informa Connect reserves the
right to cancel the course, change the programme, alter the venue, speaker or topics. For full details,
please visit www.informa-mea.com

T: +971 4 408 2894 | E: register-mea@informa.com | www.informa-mea.com

You might also like