Você está na página 1de 4

COURSE DESCRIPTION

Cyber Security
for Leaders
Cyber Security for Leaders builds
capacity to understand, identify and
increase the top-level management’s
ability to lead cyber security
development and build resilience for
future challenges.

Background Certificate

Cybercrime is one of the biggest threats for businesses Participants are provided with a certificate by
or organizations in the next two decades. Prevention MIF Academy. After the completion of this Cyber
and responsiveness are the key competences Security for Leaders course we offer you an
for better risk tolerance as well as well-educated opportunity to further expand your knowledge with
personnel. our certificate leading courses and qualifications.

To stop today’s advanced attacks, businesses need to Quality assurance


focus on protecting end users by adopting a people-
centric cyber security strategies. These strategies are
a realistic approach to cyber security, using technology Aapo Cederberg acts as the dean of the course and
and training, to protect the people in organizations Pertti Jalasvirta as the course director is responsible
and not just the technology they use. for coordination and quality assurance in accordance
with the ISO 9001 quality standard.
Improved situational awareness and education helps
organizations to prepare and protect themselves from MIF Academy gathers systematic feedback from the
constantly changing cyber and hybrid threats. participants during the course and at the end of the
course. This feedback is analyzed and proactively
Objectives utilized in our internal development work.

Schedule
Cyber Security for Leaders builds capacity to
understand, identify and increase the top-level
management’s ability to lead cyber security The course starts with 3-day onsite training delivered
development and build resilience for future challenges. by our Finnish cyber security experts and on the 4th
day the participants will recieve their certification.
This course helps you create better protection against
cyber security risks, improves your competitiveness The onsite training will be followed by 2 months
and opens new business opportunities. of online studies including independent and group
assignments in an online learning platform aswell
To Whom? as interaction with cyber security experts in weekly
webinars.

This course is targeted to senior management, high- Training methods include a mix of introductions,
level executives, experienced managers, business insights and case studies relevant for your business.
persons in middle management, and all other experts
having an influence on decision making with regard to
cyber security.
Course Schedule

Onsite Trainings
1. DAY 2. DAY 3. DAY 4. DAY
• Introduction to the cyber • Critical infrastructure • How to lead cyber security • Final task evaluation
security protection • How to build cyber resilience • Certificates
• Challenges of the cyber world • How to handle a cyber crisis to your own company/ • Open discussion
• Cyber risk assessment • Critical infrastructure organization
protection – technology point
of view

WEEK 1. Core Principles

• Distinguish between cyber security and information security


• Discuss the motivations and impact of cyber security on global
politics and individual organizations
MODULE 1

WEEK 2. Actors Micro-learning modules with


specific objectives
• Cyber security landscape
• Offensive and defensive actors

WEEK 3. Five Megatrends


Collaborative online
• Political, economical, military, information ja hybrid participation
• Indiators and early warning sights

WEEK 4. Situtional Awareness


MODULE 2

• Strategic situational awareness Evaluating current


• Concept of OODA loop and data sources for situational awareness
practices

WEEK 5. Risk Management

• Basic principles of risk management


• Risk analysis: Identify & prioritize assets
• Assessing risks and identify risks Validated measurements for
feedback and benchmarking
M ODU LE 3

WEEK 6. Laws, Regulations and International Standards

• List the laws and regulations that impact your organization 


• Briefly describe how your organization’s cyber security is impacted
by these laws and regulations Project templates and ready
• International laws and regulations to use lesson plans

WEEK 7. Securing Infrastructure and Technology

• Securing critical infrastructure


MODULE 4

• Examples of attacks against critical infrastructure


• Technologies and key threats at different layers of the technology stack

WEEK 8. Cyber Resilience

• Maturity level: threat analysis


• Identify and detect: personal, organizational and partnership
resilience
• Respond and recover: technical and physical resilience
• Govern and assure: technical and physical resilience

The recommended weekly time commitment for core content is 3-4 hours, taking into account
the busy lifestyles of working professionals, with an additional 1-2 hours recommended for
non-compulsory weekly extension activities, should you have the time.
Why should you participate in this course?

Professional Educators
This program is designed in collaboration with MIF Academy, Cyberwatch
Finland and Claned Group. We offer trusted Finnish cyber security know-
how, pedagogic excellence and e-learning expertise – a comprehensive,
world-class solution for the cyber security needs of your organization.

Artificial Intelligence Online Learning Platform


Studies are mainly taking place on Claned AI online learning platform,
that is the easiest way to build learner-centric and cost-effective online
courses that users love.

Finnish Cyber Security Know-how


Main purposes of this program is to put Finnish cyber security expertice
into practice in local context in meaningful way, build local capacity
and provide access into next generation online learning platform for
everybody.

Faculty & Experts

Aapo Cederberg Pertti Jalasvirta Juha Remes


Cyberwatch Finland, CEO Soprano Plc Finnish Information Security Cluster,
Associate Fellow of the Global Executive Director, 360 Cyber Academy Executive Director,
Fellowship Initiative, Geneva Centre of Associate Fellow of the Global Chairman of Board North European
Security Policy (GCSP) Fellowship Initiative Geneva Centre of Cybersecurity Cluster NECC,
Security Policy (GCSP), Board Member of European
President of Finland Chapter of World Cybersecurity Organization ECSO
UAV Federation (WUAVF)

Você também pode gostar