Institutional managers

Management executives

Employees of computer security departments

Managers of cyber security

The need for training

In recent years, cybercrime and natural disasters have increased in frequency and severity. Institutions are required to ensure that their information technology (IT) equipment, services, and data are protected. The development of a plan to follow can reduce the impact of a security breach. A cybersecurity contingency plan is what we refer to as this plan.

An important risk management step is the implementation of a cybersecurity contingency plan. Instructions and recommendations are provided on how to recover the service and save data in the event of a security breach, which will significantly reduce the amount of damage. A root cause analysis of these breaches is also included in this plan.

Image
Learning Outcomes

1

Determine the components of a cybersecurity contingency plan

2

The ability to build a response team for cyber incidents.

3

Develop appropriate response plans based on the nature of the work.

4

Determine the appropriate strategy based on the nature of the cyber penetration

5

Understand the general strategies that apply to most cyber breaches

6

Build a cyber-intrusion containment strategy .

7

Analyzing the Business Impact (BIA).

8

Calculating and determining the likelihood of downtime and direct operations .

Course Contents

An introduction to information security management.

1
  • Describe the components of a contingency plan .
    • Business impact assessment (BIA)
    • Incident response planning (IRP)
    • Disaster recovery planning (DRP)
    • Business continuity planning (BCP)
2

Describe the elements required to begin the process of contingency planning.

3

Establish an incident response team .

4

Establish a contingency plan (timeline for the contingency plan) .

5

Make a plan for incident response and list the general strategies that are applicable to most incidents .

6

Developing a strategy for incident containment.

7

Describe the techniques that can be employed when forming a security incident response team .

8
  • The Reaction Force.
    • Planning for “Before the Incident"
    • Actions Taken “During the Incident”
    • Planning for “After the Incident”
9

Develop information security policies for the development of contingency plans.

10

Develop a Business Impact Analysis (BIA).

11

Calculate and Determine Mission/Business Processes and Recovery Criticality.

12

After-Action Review

13

Revising and maintaining the plan

14

Copyright 2022 Security Circles. Developed By Enad abuzaid