…soft cyber controls to mitigate known and emerging cyber threats Learn how to manage cyber attacks (recognition, containment, eradication and recovery) to minimise operational, financial and reputational damages Tool Box Cyber risk assessment score cards Penetration testing techniques Cyber risk incident management plan ARiMI cyber risk management guidance paper Who Should Take This Course The following groups of people will find this program particularly beneficial: IT, Information Security Specialists and Managers C-Suite Chief Risk, Financial and Operational Officers CROs / Risk Managers Heads of Department Data & Compliance Officers, Managers and Executives Internal Audit Duration & Date 2 days Course… Read More