IT GOVERNANCE AND WHAT BOARDS NEED TO KNOW
11 SEPTEMBER 2017 Dubai, UAE
Company data holds acute importance for every business. The rising threats in information security incidents and cybercrime makes this a critical requirement and key risk for any business today.
Objectives of this workshop:
- To highlight the role of leadership in strategizing, governing and leading a cyber security program.
- To present the top current cyber threats that pose a risk
- To gain an understanding of some of the key capabilities that today’s hackers possess and what tactics they use in order to infiltrate and compromise an environment.
- To demonstrate various hacking case studies to clearly emphasize how hackers strategize and attack your environment
- To understand how you can initiate a cyber security program and improve the ones you have.
1 DAY WORKSHOP OUTLINE
- Some hacking demonstrations through case studies and scenarios that show how hackers can use simple widely available tools to compromise your environment
.• Leadership are usually a big target for hackers. We will show the different hacking tactics that attackers use in order to take advantage of the leadership’s privileges and use them maliciously to serve their agenda.
Introduction to Cyber Security
- What is cyber security? Is it only threats caused by hacking? What else causes threats to your environment?
- What are the key areas of cyber security and how do they correlate with each other?
Recent Cyber Security Trends
- Case studies and examples of high profile hacks that have happened recently, how they happened, why and how they could have been prevented and how an adequate cyber security program could have made a difference
.• The most trending attacks and cyber threats that have been occurring
- How leadership can influence their organization in protecting against such threats
Cyber Security Strategy and Governance
- Governance is the key. Governance guidelines and how strong policy will protect you from cyber threats and help you and your staff identify cyber incidents.
- The role of the board to sponsor policies and procedures, governance and awareness programs and monitor them and ask the tough questions that need to be asked.
Leadership in Cyber Security
- The importance of the Board’s role is when it comes to creating and enforcing a cyber security program.
- Most common challenges for implementing an effective cyber security program
Wael Ahmed Fattouh
Wael is a Partner in the IT Risk Assurance practice. Wael studied and lived in the United States for many years and that is where he started his PwC career working with our US office for three years before moving back to the Middle East firm. Prior to that, he was an IT project manager with Nike, managing large international projects.
- BS in Information Systems Management (USA).
- BS in Business Management (USA).
- Minor of Science in Computer Science (USA).
- Certified Information Systems Auditor (CISA).
- Certified ISO27000 Lead Auditor
- Certified ITIL V3
- Certified ISO20000 Lead Auditor / Implementer
- Certified BS25999 Lead Auditor
Who Should Attend?
This workshop is suitable for senior board directors, board secretaries or C Suite Executives who sit on a Board or a Board Committee, the Senior Executives who have responsibility for a cyber security.
Price per person for 2 day workshop
GCC BDI Members USD 3600
Non-Member USD 4000
Special rates are available for companies wishing to purchase multiple seats – please ask us for more information.
All participants who complete our workshops also currently receive free membership of GCC Board Directors Institute for one year.
contact us on email@example.com or call +971 4 554 7967
COMMENTS ARE OFF THIS POST