The British Academy for Training and Development offers this course in “Cybersecurity and Enterprise Risk Management” which equips professionals with essential knowledge and practical skills to assess, mitigate, and manage cybersecurity threats and enterprise risks holistically.
Participants will gain insights into global risk frameworks, cybersecurity governance, incident response planning, and compliance requirements, with an emphasis on aligning cybersecurity strategy with overall enterprise risk management (ERM) practices.
Who should attend?
Knowledge and Benefits:
After completing the program, participants will be able to master the following:
Core concepts of cybersecurity
Difference between information security and cybersecurity
The importance of cybersecurity in modern organizations
Malware and targeted attacks
Ransomware and phishing
Insider threats and malicious users
Components of an organizational cybersecurity system
Integration of cybersecurity with IT infrastructure
Management's role in supporting information security
Overview of ISO/IEC 27001 and 27005
Data protection laws such as GDPR and NCA regulations
Compliance with national and international policies
The five core functions: Identify, Protect, Detect, Respond, Recover
Applying NIST in various organizational environments
Real-world use cases of NIST frameworks
Securing internal and external networks
Firewalls and intrusion detection systems
Email protection and VPN security
Patch management and software updates
Access control and privilege management
System hardening and vulnerability reduction
Concepts of authentication and authorization
Identity and Access Management (IAM) and Single Sign-On (SSO) systems
Multi-Factor Authentication (MFA) technologies
Securing applications against known vulnerabilities (OWASP)
Penetration testing and security assessment techniques
Protecting stored and transmitted data
Incident response and recovery steps
Computer Security Incident Response Teams (CSIRT)
Incident reporting and documentation
Evidence collection and analysis of compromised systems
Tools and techniques used in forensic investigations
Chain of custody and legal compliance
Basic principles of encryption technologies
Encrypting data in transit and at rest
Encryption key management and associated policies
The importance of cybersecurity awareness among employees
Awareness programs and ongoing training
Measuring the impact of awareness on user behavior
Relationship between governance and security risks
Developing security policies and procedures
The role of executive leadership in supporting cybersecurity
Steps to develop an effective security strategy
Prioritization based on risk assessment
Periodic review and updates of the strategy
Cybersecurity in the age of AI and cloud computing
Security challenges in the Internet of Things (IoT)
Digital transformation and its impact on protection strategies
Note / Price varies according to the selected city
Control Objectives for Information and Related Technologies (COBIT)
2026-05-10
2026-08-09
2026-11-08
2027-02-07