Ir al contenido principal

Manage the cyber threat for finance professionals

In this course, we use scenarios/examples to examine the threat of a cyber-attack and good practices on mitigating the risk.

Manage the cyber threat for finance professionals

Hay una sesión disponible:

Una vez finalizada la sesión del curso, será archivado.
Comienza el 15 oct
4 semanas estimadas
3–5 horas por semana
A tu ritmo
Avanza a tu ritmo
Gratis
Verificación opcional disponible

Sobre este curso

Omitir Sobre este curso

This course is designed for accountancy, finance and business professionals working in all organisations from small business, large corporates or financial services or who are just interested in learning more about the vulnerabilities organisations are exposed to and the options available to protect their organisation. With a focus on practical skills throughout, this course provides the ability to apply skills as well as understand them.

De un vistazo

Lo que aprenderás

Omitir Lo que aprenderás
  • How to facilitate a risk assessment to identify the potential threats and the vulnerabilities they may exploit and the business impacts of a cyber-attack.

  • Recognise that the risks are constantly changing and the need for continuous process improvement. Including how to monitor and report on the effectiveness of the cyber/information security practices.

  • Understand how to manage an incident and the processes required to effectively respond and recover.

  • Understand that effective security protection is a combination of people, process and technology and how to create a culture of cyber and information security.

  • Understand the physical and logical access controls which should be implemented to adequately and appropriately protect the organisation’s information and technology resources.

  • Understand the potential risk responses and mitigation actions to appropriately and adequately protect the business from the identified cyber risks.

Plan de estudios

Omitir Plan de estudios

1. Introduction

  • Objectives of the course

  • Outline of the cyber threat

  • What’s different about cyber

2. The basic hygiene factors

  • Secure configuration of IT infrastructure

  • Malware protection

  • Configuring network devices securely

3. Approach and effective access controls

  • Implement approaches and effective access controls

  • The importance of 2 factor authentication

4. Understand risks

  • Principles of risk management

Manging the risks effectively

5. Understand and manage third-party supplier risks

  • Manging the full supply chain

  • Information value and sensitivity

  • Supplier impacts on service delivery

6. Understand and manage third-party supplier risks

  • Manging the full supply chain

  • Encouraging a cyber-security aware culture

  • Words into actions

7. Respond and recovery

  • Incident management capability

  • Respond and recover plan for breaches

8. Continuous improvement

  • The need for performance monitoring

  • Defining appropriate KPIs

  • Performance dashboard

9. Skills and resources

  • The importance of access to the right skills

  • The need for up-to-date training

10. Concluding themes

Acerca de los instructores

¿Quién puede hacer este curso?

Lamentablemente, las personas residentes en uno o más de los siguientes países o regiones no podrán registrarse para este curso: Irán, Cuba y la región de Crimea en Ucrania. Si bien edX consiguió licencias de la Oficina de Control de Activos Extranjeros de los EE. UU. (U.S. Office of Foreign Assets Control, OFAC) para ofrecer nuestros cursos a personas en estos países y regiones, las licencias que hemos recibido no son lo suficientemente amplias como para permitirnos dictar este curso en todas las ubicaciones. edX lamenta profundamente que las sanciones estadounidenses impidan que ofrezcamos todos nuestros cursos a cualquier persona, sin importar dónde viva.

¿Te interesa este curso para tu negocio o equipo?

Capacita a tus empleados en los temas más solicitados con edX para Negocios.