Cyber Threat & Operational Risk
1 July 2014 | Central London
*Visit the website for more information and to SAVE 15% on registration fees quote VIP code FKM62837GRC*
Enhancing cyber risk management frameworks:
- Key characteristics & technical terminology
- UK government’s ‘10 steps to cyber security’
- Monitoring key systems and networks
- Network security and penetration testing
Effectively monitoring the cyber threat environment:
- Horizon scanning & internal defence monitoring
- Learning from external events
- IT and cyber risk indicators triggers and limits
- Integrating IT and operational risk indicators
Benefiting from value adding IT governance:
- Incorporating IT within the Op Risk framework
- Bringing business and IT managers together
- Building the Information Security Policy
- Third party management
*Visit the website for more information and to SAVE 15% on registration fees quote VIP code FKM62837GRC*
Comments