Responding to Cybercrime threats
An analysis of the online risks and responses facing the firm in the era of Web 2.0
This intensive and practical 2 day course has been specifically designed for the non-technical layman to explain the business and operational effects of cyber security risks and vulnerabilities. Responses and best practice are covered in equal measure and participants will develop a sound appreciation of the following topics:
- Malware exploits – what to avoid
- How network attacks and distributed denial of service attacks work
- Social engineering exploits live via social media
- Bring your own device (BYOD) risks and the rise of the tablet
- Rootkits, Botnets, Cloudnets and Malnets – why they matter
- Advanced persistent threats (APT) – industrial grade attacks
- The Deep Web and how to exploit it
- Internet investigations & search techniques demystified
- Audits, testing and risk assessment approaches
- Key components of the cyber security plan
Combining presentations, live online demonstrations and group activities, the event has been carefully designed to foster learning, understanding and networking.
Who should attend
No technical knowledge is required and anyone who uses computers or the Internet during their daily working life will benefit from a greatly improved understanding the risks and solutions described.
C-level decision makers will realise particular benefits from participation as the event is designed to demystify much of what is presented to management and to empower senior staff to ask the right questions of subordinates.
Attendees will achieve the following outcomes:
- A greatly improved level of risk awareness
- An understanding of the solutions and corporate responses required
- Improved online investigation skills
- The knowledge required to support policy development and decision making
Mark Johnson has spent 30 years working in government and corporate security and investigations functions, primarily in the information and communications technology sector. He is a popular speaker and the author of two books on communications risk and cyber security.
Registration and arrival refreshments between 9:00 to 9:30 with the workshop commencing promptly at 9:30 and due to finish at 17:00
IRM Members £875
Non Members £985
For more information or any further enquiries about this course please contact email@example.com