IET logo
Cyber Essentials (logo)
 
Cyber Essentials Fundamentals 2017 (header)

Cyber Essentials Fundamentals 2017

 
Prove to your customers that your business is cyber secure

21 - 22 September 2017 | IET London: Savoy Place

CPD 16 hours IET London: Savoy Place (logo)
 

Programme

Module 1: Cyber Essentials (CE) Fundamentals for Senior Managers
21 September 2017

The course, which will be delivered over one day through several interactive sessions, explains the five key requirements of the Cyber Essentials (CE) scheme. This will be set in the context of the audit and assessment requirements for CE and CE Plus.
 

What will be covered?
  • Understanding the security threat landscape
  • Background to the Cyber Essentials (CE) scheme
  • Understanding and defining the assessment scope
  • Recommended risk methodologies and treatments
  • Applying the five key controls
  • The process – certification options for CE and CE Plus
  • MOD’s DCPP cyber security model requirements
  • How CE contributes as part of continuous monitoring and control
  • GDPR – what does it mean to my business and to me?
     
Who is this module aimed at?

Senior Managers and Directors who have responsibility of information security and associated risk management within their company. Job roles might include, but are not limited, to:

  • Chief Technical Officers (CTO)
  • Chief Information Security Officers (CISO)
  • Chief Security Officers (CSO)
  • Chief Information Officers (CIO)
  • Supply Chain Managers
  • Quality Managers
  • Business Intelligence Leads
  • Head of Corporate Security
     
Course tutor

The Training will be delivered by a MASS CE Qualified Technical Assessor and a MASS NCSC CCP Certified IA Auditor.

 

Module 2: Cyber Essentials (CE) Fundamentals for IT Security Professionals
22 September 2017

The course, which will be delivered over one day through several interactive sessions, explains the technical requirements associated with the five key requirements of the CE Scheme.

This will include details on vulnerability scanning and malware protection and be set in the context of the audit and assessment requirements for CE and CE Plus.
 

What will be covered?
  • Background to the CE scheme
  • Understanding and defining the assessment scope
  • Commonly used tools – what they are good at
  • Common reasons for unsuccessful certification
  • The external vulnerability scan
  • The internal vulnerability scan
  • Email binaries and payloads
  • How CE contributes as part of continuous monitoring and control
     
Who is this module aimed at?

Managers and Technical Delivery staff. Job roles might include, but are not limited, to:

  • IT Managers
  • IT Security Managers
  • Network Managers
  • Technical Delivery Managers
  • IT Service Delivery Manager
  • Information Security Managers
  • Information Security Technical Officers (ITSO)
  • Cyber Security Consultants
  • Cyber Security Specialists
     
Course tutor

The training will be delivered by a MASS CE Qualified Technical Assessor and a MASS Senior CESG Certified Security and Information Risk Advisor.