Cyber Security, Frameworks and Standards

Overview

Standards represent best-known practices that an organization can use to establish an effective management system. Meanwhile, frameworks are used to help an organization focus people, groups, and departments, on a common goal. This course is an investigation of how to apply:

  • Information and cyber security frameworks within your organization
  • How to evaluate, and determine which ISO, NIST, SOC 2, or ITSG standard best meets the needs of your organization
  • How to tailor your risk management and information security management system to align with regulations, such as, the Privacy Act, PIPEDA, GDPR, and CCPA

 

Learning Outcomes

Building on the body of knowledge the participant will be able to:
  • Apply information security (InfoSec) and cyber security frameworks
  • Evaluate the benefits of standards such as ISO 27001, 27002, 27701, 22301, 31000, NIST 800, ITSG-33 and SOC 2
  • Defend their selection of a framework and standard
  • Formulate strategies of how to best communicate their cyber security selection with internal groups

 

Audience

  • Managers and Senior Managers who manage or lead technology teams
  • Personnel who have information and cyber security elements in their workplace
  • Personnel who deal with information management systems or assess information and cyber risks
  • Personnel looking to enhance their careers in information and cyber security management
  • Project Managers with requirements to manage new information and cyber security projects

 

Duration

12 hours

 

Cost

  • Regular: $1095 (plus tax)
  • SCALE AI: $547.50 (plus tax) – From January 2023 - March 2023

 

SCALE AI

This course is supported by SCALE AI. All persons employed in Canada are eligible to benefit from a 50% discount on enrolment fees. Please select the SCALE AI session below and register with your work email address and work mailing address. 


Featured Instructor

Alan McCafferty is a Senior Business Analyst with 25+ years of progressive experience working with public organizations, not-for-profits, start-ups, and multi-national corporations.  Educated in Canada, the USA and Europe in multiple disciplines including Engineering, Business, Risk Management, and Lean 6 Sigma, he is the author of more than 25 white papers and the recipient of the Canada Award for Excellence. During his career, Alan has led the delivery of multi-year $1 billion+, mission critical information technology projects.  As a Cyber Security SME, Alan was key in the developed of the University of Ottawa’s Professional Development Institute cyber security program and teaches several of the courses.  Alan has successfully completed IT, Security, Process, Threat Risk Assessments (TRA), Privacy Impact Assessments (PIA), health and safety projects for federal government departments, provincial healthcare organizations and national not-for-profit organizations.  As a senior consultant, he uses his Lean 6 Sigma skills, along with his risk and security experience to help organizations implement low waste, and effective lean processes in areas such as information security management systems, business continuity, department security plans, quality management systems, health, and safety management systems.

Mark Hearn is a seasoned Business Leader and technical Product Management executive, bringing technology and business together to solve market problems for over 25 years. Mark’s expertise in software security and anti-reverse engineering has helped industry leaders solve critical product security issues with innovation and minimized risk. As a product security evangelist, Mark has spoken at many industry conferences and engaged in panel discussions on the need to protect software products from attack. He is an expert on the business risks associated with reverse engineering and the critical impact that hacking could have for manufacturers, and for their customers. Mark has held executive roles in product management and strategic market development, developing expertise in both the business-critical and technical functions related to business strategy, use/abuse cases, technical requirements, competitive analysis, and security threat-risk analysis.

 

Sessions

Event CodeTitleBegin DateEnd DateTermDelivery MethodRegister to Event
S00422302ACyber Security, Frameworks and Standards2/13/20232/16/2023WinterOnlineRegister to Event
S00422305ACyber Security, Frameworks and Standards5/1/20235/4/2023SummerOnlineRegister to Event