Syllabus Executive CISO
Executive cyllabus CISO
- Introduction to Cyber Security:
CISO Course Pedagogical Introduction (Administration, Requirements, Responsibilities); Recent Cyber Breaches and Incidents; Basic Terminology; Security Concepts; Risk-Based Approach; Introduction to Cybersecurity Management - Security by Design:
Enforcing Security by Design; Cybersecurity Principles; Cybersecurity Controls. - Network Security - Firewalls and IDS/IPS:
Intro to Firewall Concepts; FW Capabilities and Features; Types of FW (OSI Oriented); Packet Filtering, Stateful Inspection, Proxy Gateways; UTMs; Introduction to Next Generation; Introduction to IDS and IPS; IDPS Techniques and Methods. - Introduction to Cloud Computing and Security:
Module 1: Fundamentals of Cloud Computing; Definitions; Architectures; Role of Virtualization; Service Models;
Module 2: Cloud Components, Networks, Management Interfaces and Administrator Credentials. - IOT Security:
Introduction to IOT; Concepts; Examples and Discussions Regarding IOT and Cyber; Incorporating IOT into the Organizational Culture and Implications on Cyber Architecture. - SCADA Security:
Introduction to ICS/SCADA Security; SCADA Terminology and Concepts; Introducing OT vs. IT and relevant Defensive Measures; Introduction to Standards and relevant Compliance. - Integrated Technological Architecture:
Putting Everything Together (System and Network); Use Cases and Scenarios Discussion; Fitting a Holistic Solution. - Offensive Cyber Introduction:
Introduction & Overview to Offensive Cyber Security, entering the world of hacking. The who and why. - Introduction to Incident Response:
Triad of Security Operations Center: People, Process and Technology. Intro to Incident Response Plan. How to handle security incident based on the six key phases of an Incident Response Plan. The importance of Incident Response and who is response for Incident Response. SOC Duties and Training. - Introduction to Methodology (GOV and CR):
What is Governance, What is Regulations; How is Cybersecurity Management Affected by Governance and Regulation; Introduction ISO, NIST and INCB.
CISO Role: The Need for Business Alignment; Introducing Processes, Life Cycles and Frameworks; Introduction Security Architecture by Secure Design. - Cyber Laws:
Relevant and Applicable Laws and Regulations; National and International Cyber Laws and Legal Cases; Discussing the Need for Compliance and Regulations; Introducing Use Cases. - Governance (Corporate, IT, Security):
What is Strategy: Corporate Strategy, InfoSec Positioning, Risk Modeling, Contextual InfoSec, Conceptual InfoSec, Creating a Strategic Plan. - Cyber Compliance:
Discussing Cyber Compliances; Various Industries Compliances (Health, Finance / Banking, Credit, Insurance); PCI, SOX, Bank of Israel Directive 357 and 361, Regulator of Insurance Directive. - Security Policies and Procedures:
The Need for an Organizational Cybersecurity Policy; Creating a Policy Document; Importance of Executive Management Support; Elaborating on Policies, Standards, Procedures. - Information System Security Engineering:
Security By Design; NIST Cyber Security Framework and NCSA Organizational Cybersecurity Framework; Embedding Principles into System Architecture; Security Policies; Security Models; Defining Security Requirements (via Goals, RFP, RFI); Evaluation Criteria. - Cyber Security Risk Management Framework:
Planning for Risk Management; Identifying Risks; Qualitative Risk Analysis vs. Quantitative Risks Analysis; Planning Risk Responses and Controlling Risks. - Cyber Security as a Process:
Introduction to Processes; Security Management as a Business Process; Discussing Security Maturity; Evaluating a Security Process Maturity (CMMI); Security Process Catalogue. - Business Continuity Management and Data Recovery Processes:
Introducing concepts of BCP/BCM and DRP; Establishment of Business Continuity Planning and Disaster Recovery Including Business Impact Analysis, Recovery Strategy, Plan Testing and Maintenance. - Communication and Awareness:
Communication and Awareness; Cyber Security Training; Embedding Cyber Security into the Organizational Culture. - Cybersecurity Projects Management:
Project Management, but from a Cybersecurity Perspective; Discussing issues of Resource Allocation, Budgeting, Time Management, Setting Expectations of Progress and Outcomes. - Introduction to Supply Chain:
The supply chain is one of the weakest areas in information security. We will learn about all the processes that must be performed in securing information against the supply chain. - Cyber Security in Real Life:
Bringing Everything Together; Discussing Real Life Aspects of Cyber Security; Practical Walkthrough of Real Scenarios of the CISO Role. - Metrics
- EXERCISE I:
INCIDENT RESPONSE C-Level Brainstorming. - EXERCISE II:
INCIDENT RESPONSE C-Level Brainstorming (Cont.).