Certified Cyber Risk Officer - September 2022

Provided by

Enquire about this course

About This Course

8 Weeks

Plus 1 Week Initial Orientation

8-10 Hours Per Week

Self Paced Entirely Online

Online Academy

Delivered Entirely Online

80 CPD Points
Approved by Various Bodies

Certification

Continual Assessments

Next Course Starts September 5th

Learning Modules Every Thursday

€1,950* (VAT Not Applicable)
Installment Plan and Funding Available


CCRO Course - 1 Min

The Cyber Risk Officer course equips students with a comprehensive understanding of cyber risk management. The syllabus assumes a non-technical student and covers a range of topics from identification of cyber risks through to risk management options. The course has been designed to equip students with the knowledge, skills and confidence they require in order to protect the digital assets of their organisation and support the efforts of or lead the implementation of a cyber risk framework.

What Does The Course Cover?

"Learn how to understand, manage and communicate cyber risk strategically within an organization"

This course presumes no technical knowledge and brings students on a journey from understanding the cyber threat landscape to how to develop an appropriate cyber strategy for their organization.

Referencing real life case studies and supported with pragmatic examples of how to manage cyber risk within an organization the course path includes key learning objectives, that students can instantly apply and benefit from in their existing roles.

All students receive one to one feedback and support directly from the tutor on a weekly basis along with live group training sessions supported by continual assessments via online exams.

Written assignments are focused around practical scenarios and involve applying knowledge and communicating key messages with a senior business audience.

"If you are on a board or report to senior leaders in relation to cyber risk, this course is ideal for you"

Explore The Modules

MODULE 1

UNDERSTANDING CYBER RISKS AND A LITTLE TECHNOLOGY

We explore the cyber threat landscape and gain an understanding of the key threat actors, their motivations and techniques. We review a number of high profile cyber attacks with a view to understanding why they were attacked and what could have been done to prevent the breach. We outline a key "Case Study" example that is referenced through the rest of the course.

MODULE 2

CYBER STRATEGY - THE BUSINESS CASE

We outline the importance and the anatomy of a cyber strategy. How a cyber risk framework operates and how it integrates with the organization. Understand the differences between standards, policies, procedures, legal and regulatory controls. We outline how to identify the business value chain of an organization and the importance of business systems, assets and entities that support that channel.

MODULE 3

CRQ - CYBER RISK QUANTIFICATION AND METRICS

We explore the traditional cyber metrics organizations leverage in relation to cyber security and risk and discuss "Meaningful Metrics" that empower the business. Calculating inherent cyber risk, residual cyber risk and aligning those metrics with business objectives. Informing and supporting the business with KPI's (Key Performance Indicators) and KRI's (Key Risk Indicators). Leveraging those metrics to develop appropriate maturity roadmaps and report and alert the business.

MODULE 4

CYBER LEADERSHIP AND CULTURE

The role of leadership, the governance structure and supporting processes are outlined. The challenge of resourcing, attracting new and developing in-house talent. Establishing a culture of loyalty and business protection. Identifying gaps in leadership and supporting a meritocracy based on talent and ability. Converging the physical security efforts with cyber to deliver a holistic program of protection for your organization.

MODULE 5

CYBER RISK AND THE LAW

Understanding the complex myriad of cyber related laws, regulations and business requirements is a challenge. In this module, we outline International landscape of key laws and regulations including GDPR and the NIS Directive. Developing an approach to understanding how to identify what is relevant and may impact your current or future business model. We outline key approaches to identifying the nexus of control requirements and driving efficiency by aligning business, legal and regulatory drivers with business drivers.

MODULE 6

CYBER RESILIENCE AND INCIDENT MANAGEMENT

We outline the minimum expectations of regulators when it comes to establishing cyber resilience. Understanding preventative, detective and responsive controls. Best practices in aligning business continuity, disaster recovery and incident response with a program of cyber resilience. We outline the appropriate response to a breach. We focus on key aspects such as detection, communication and containment. We leverage the case study to outline the key aspects and learning points such as proactive strategies to detect an incident and containment strategies to mitigate the impact.

MODULE 7

THIRD PARTY CYBER RISK - VENDORS AND REMOTE WORKERS

Every business is comprised of a business value chain. That is the various "links" or parts of the business that support the delivery of a particular service or channel. These links are often provided by third party partners, vendors or remote workers. We explore, how to identify, analyze, manage and report the associated risk to the business. The impact of the paradigm shift in the legal landscape including GDPR and how that factors into your approach.

MODULE 8

PUTTING IT TOGETHER - DEVELOP A CYBER RISK STRATEGY

In this module, we outline how to put everything you have learned together. Students leverage the case study or their own organizations to develop a complete cyber risk strategy. Dissecting the Cyber DNA of the business, establishing key metrics and a maturity roadmap. Aligning with the business strategy and establishing a board level reporting process. Developing processes to measure and manage the implementation of the cyber risk strategy and report the RoI to the business.

The Course is For?

The course syllabus has been specifically designed to be collaborative and bring together business leaders of various disciplines within an organization. They are the key stakeholders in designing, implementing or supporting the cyber risk management program of an organisation. Key cyber risk management stakeholders include:
  • C-Suite
  • CISO/CSO/CIO or CRO
  • Head of IT/Security
  • CCO Chief Compliance Officer
  • Cyber Security/Risk/Compliance Teams
  • Legal
  • Procurement
  • Head of Business Units
  • Technology Leaders / Project Managers
  • Management Professionals / Team Leaders
  • Digital Consultants
IDEAL TRAINING COURSE FOR

Cyber Risk Leader

Develop and Implement Strategy

Gaining Recognition

Cyber Risk Management Specialist

Cyber Security and Risk Teams

Collaborate and Support Enterprise

How Do You Learn?

The course is delivered over 8 weeks and preceded with an orientation module. Every Thursday a new module is added to the course. During the orientation module you will be introduced to your online teaching and technical support network and gain an understanding of the interface and tools. During the orientation phase you complete your student profile and gain an understanding of key milestones and how your assessments are calculated. Training material comprises of rich interactive media such as videos, infographics, activities and course notes. There are many opportunities for collaborative learning via the discussion forums and you can leverage the portal to connect to other students around the world. During the course you can reference the case study example outlined in Module 1 or reference your own organization. During the course students will develop a cyber strategy as part of their assessment, this can be based on their own organization, the case study or a fictitious entity

What Support Do I Get?

Head Tutor

Subject Expert

Course Manager

One to One Student Support

Technical Support

Available to Solve Tech Issues

Social Learning

Student Network Collaboration

Extended Network of Material

Recommended External Material

Subtitles/CC

Core Module Videos Have Captions

Head Tutor

Paul C Dwyer - President of the ICTTF International Cyber Threat Task Force

Paul C Dwyer is recognised as one of the world's foremost experts on cyber security, risk and privacy. As CEO of Cyber Risk International he specialises in corporate and enterprise security, development of cyber defence programs, and business operations protection for CRI clients. As founder and President of the ICTTF International Cyber Threat Task Force he is an advocate for diversity in the industry and leads a community of over 30,000 with a common goal to defeat cyber evil.

Certified an industry professional by the International Information Security Certification Consortium (ISC2) and the Information System Audit and Control Association (ISACA). Approved by the National Crime Faculty and the HTCN High Tech Crime Network. He has worked extensively around the world his diverse career spans more than 30 years working with military, law enforcement and the commercial sector.

Roles have included:
  • President of the ICTTF International Cyber Threat Task Force
  • Co Chairman of the UK NCA National Crime Agency Industry Group
  • Advisor to NaCTSO (National Counter Terrorism Security Office)
  • Advisor to NATO on Countering Hybrid Cyber Threats
  • Advisor to UK Defence Committee DEFCOM in Parliament
  • Deputy Chair - Organised Crime Task Force Industry Group - NI
  • Interim Global CISO for numerous multi national organisations
  • Advisor to numerous governments and intelligence agencies
PAUL C DWYER CEO - BIO

"An eye opening course bringing to life exactly what a CISO is and maybe more importantly what is isn't. Many lightbulb moments that will help refocus how to better align security with the business, and what it takes to be successful." Mark Conabeare - CISO Debenhams

"An eye opener giving a global picture backed up with real world examples, Great Knowledge." Shane O'Reilly - Head of IT - Total Produce

Enquire

Start date Location / delivery
No fixed date Online Book now

Related article

A set of measures to change the conversation from security to risk management, fully aligned to business strategy