Cybersecurity Strategy & Implementation

Mastering cyberscurity strategies

September 23-24, 2024, 08:00 AM - 04:00 PM Courtyard & Fairfield by Marriott Medical Market Center, Dallas, TX, USA.
IN-PERSON/WEBINAR

Training Objectives

Attendees will learn about the latest trends in cybersecurity methodologies and strategies. The importance of choosing a proper framework is also emphasized. Creating an implementation plan is difficult without proper guidance, so several options will be explored. Additional discussions will address how organizations prepare for assessment and monitoring challenges. Several case studies will also be discussed in detail.

Register Now Download Brochure

Instructor of this course

Dean Pompilio

CISSP, CISM, CISA, CEH, CHFI, CSAP, CSAE, CND

  • President & CEO - SteppingStone Solutions

  • Past: Adjunct Professor |Cyber Security | Risk management | Business Transformation - University of Charleston

  • Past: Sr. Information Security Specialist - IFC - International Finance Corporation

  • Past: Sr. Firewall Engineer - Department of State

  • Past: Sr. Security Analyst - Department of Justice

  • Ms. Computer Science - DePaul University

  • Masters Certificate in Visual Communications & Digital 3D Design - The Johns Hopkins University

More Detail

15 CPE Hours


Developing an enterprise cybersecurity strategy is a challenging project. There are many choices, which need to be coordinated among various elements of any organization. This course provides a broad overview of many aspects of cybersecurity trends, including frameworks, performing assessments, and selecting the best guidance available.

You will leave with an understanding of

  • The attendee will gain an appreciation for staying up to date on current trends in cybersecurity
  • We will discuss several aspects of choosing a proper cybersecurity framework
  • Learn how to develop an implementation plan using the roadmap concept
  • Best practices for cybersecurity guidance will be discussed
  • Cybersecurity executive management
  • Cybersecurity militiary personnel
  • Cybersecurity engineers
  • Network engineers & administrators
  • System engineers & administration
  • Presentations/lectures
  • Interactive practical exercises
  • Quizzes
  • Individual assignments and interaction
  • Group discussions
  • Feedback discussion of the previous session activities
  • Course material
  • Certificate of Achievement
  • Lunch with coffee/tea break

Course Fee $1700/Participant

Individual
15% Early Bird Discount $1,445 till Jul 22, 2024
10% Early Bird Discount $1,530 till Aug 19, 2024

Groups/Corporate
2+1 Offer $3,400 for 3 Participants
3+2 Offer $5,100 for 5 Participants
OR
25%
Discount for Group/Corporate


Cybersecurity Strategy & Implementation - Course Schedule

Day 1 - Monday 23 September, 2024
Registration, Kick off and Introduction
Session One

Morning Session - Part 1

  • Global Cybersecurity Trends
  • Global Cybersecurity Damages
  • Industry Cybersecurity Trends
Coffee/Tea Break
Session Two

Morning Session - Part 2

  • Useful Threat Feeds
  • Creating a Cybersecurity Strategy
  • Case study #1: Colonial Pipeline Cyber Attack
Lunch Break
Session Three

Afternoon Session - Part 1

  • Choosing a Cybersecurity Framework
  • NIST Cybersecurity Framework
  • Performing Risk Assessments
    • NIST SP 800-30
Coffee/Tea Break
Session Four

Afternoon Session - Part 2

  • Conducting a Security Assessment
    • NIST SP 800-15
  • ISO IEC 27001/ISO 27002
  • Case Study #2: Chinese APT

End of Day

Day 2 - Tuesday 24 September, 2024
Recap of previous day
Session One

Morning Session - Part 1

  • Creating a Cybersecurity Implementation Plan
  • The Roadmap Concept
    • Selecting a Security Control Standard
    • Alignment with Business Objectives
    • Security Control Implementation (Continue)
Coffee/Tea Break
Session Two

Morning Session - Part 2

  • Security Control Configurations
  • Security Control Prioritization
  • Roles and Responsibilities
  • Continuous Monitoring

Case Study #3: Drilling Deep

Lunch Break
Session Three

Afternoon Session - Part 1

  • Best Practices and Guidance
    • Security Control Configurations
    • Security Control Prioritization
    • Roles and Responsibilities
    • Continuous Monitoring
  • Cybersecurity Regulatory Compliance
    • Security Control Configurations
    • Security Control Prioritization
    • Roles and Responsibilities
    • Continuous Monitoring
Coffee/Tea Break
Session Four

Afternoon Session - Part 2

  • Case study #4: Cyber Pirates
  • Questions and Poll

Closing Certificate distribution End of Course

Course Program
Time Topic
Day 1
08:00 to 08:30Registration & Introduction
Day 1-2
08:30 to 10:30Session One
10:30 to 10:40Coffee/Tea Break
10:40 to 12:45Session Two
12:45 to 13:30Lunch Break
13:30 to 15:00Session Three
15:00 to 15:10Coffee/Tea Break
15:10 to 16:00Session Four