Description

This course equips participants with the knowledge and skills to assess cyber security threats or vulnerability situations. Through case studies, participants will develop insight and abilities to assess, recommend and defend InfoSec, Threat Risk Assessment (TRA) and Privacy Impact Assessment (PIA) and ISMS solutions.

It is strongly recommended to have completed the following course before registration:

Learning Outcomes

At the end of this course, participants will be able to:
  • Appraise organizational InfoSec and ISMS needs.
  • Defend an appropriate ISMS strategy and solution.
  • Incorporate a continuous improvement strategy in an InfoSec and ISMS, including a return to normal operations.
  • Assess TRA and PIA outcomes and reports.
  • Appraise an InfoSec incident or disaster situation.
  • Measure the effectiveness of an ISMS.

Duration

12 hours

View Schedule and Register

No content found

No content found

Instructors

Alan McCafferty is a Senior Business Analyst with 25+ years of progressive experience working with public organizations, not-for-profits, start-ups, and multi-national corporations.  Educated in Canada, the USA and Europe in multiple disciplines including Engineering, Business, Risk Management, and Lean 6 Sigma, he is the author of more than 25 white papers and the recipient of the Canada Award for Excellence. During his career, Alan has led the delivery of multi-year $1 billion+, mission critical information technology projects.  As a Cyber Security SME, Alan was key in the developed of the University of Ottawa Professional Development Institute cyber security program and teaches several of the courses.  Alan has successfully completed IT, Security, Process, Threat Risk Assessments (TRA), Privacy Impact Assessments (PIA), health and safety projects for federal government departments, provincial healthcare organizations and national not-for-profit organizations.  As a senior consultant, he uses his Lean 6 Sigma skills, along with his risk and security experience to help organizations implement low waste, and effective lean processes in areas such as information security management systems, business continuity, department security plans, quality management systems, health, and safety management systems.

 

Mark Hearn is a seasoned Business Leader and technical Product Management executive, bringing technology and business together to solve market problems for over 25 years. Mark’s expertise in software security and anti-reverse engineering has helped industry leaders solve critical product security issues with innovation and minimized risk. As a product security evangelist, Mark has spoken at many industry conferences and engaged in panel discussions on the need to protect software products from attack. He is an expert on the business risks associated with reverse engineering and the critical impact that hacking could have for manufacturers, and for their customers. Mark has held executive roles in product management and strategic market development, developing expertise in both the business-critical and technical functions related to business strategy, use/abuse cases, technical requirements, competitive analysis, and security threat-risk analysis.


Explore Lessons Learned

Before you venture out to develop and implement an information and cybersecurity system, you’ll want to look at how other professionals in the field have applied industry frameworks and standards in their organization. By looking at what has worked and what hasn’t, you’ll be better equipped to avoid repeating the same mistakes and take advantage of lessons learned from notable successes.

This course takes an in-depth look at information and cybersecurity successes and failures through real-world use cases. It looks at the real business cost of systems that have worked and those that have not. Most importantly, it allows you to draw on all the knowledge, skills, and abilities you’ve acquired through the first four courses in this program by putting you in the consultant position and posing the question, “What would you do if faced with the same situation?”

By completing this course, you’ll have a better understanding of how to best address today’s information and cybersecurity challenges. You’ll know how you can prepare any organization to avoid the pitfalls of inadequate protection systems. And you will have acquired another key learning component on the path to an Information and Cybersecurity Management Certificate program.

“The instructors, particularly Mark Hearn and Alan McCafferty, are very experienced and engaging. They have extensive cyber security industry experience through their consulting practices, which offers students a wealth of additional insight and real-world examples to complement the syllabus. Overall, I greatly recommend this course and had a wonderful experience.”
-- Caitlin M., Treasury Board of Canada

Get Grounded In Reality

By focusing on real use cases, instructors demonstrate how current challenges in the field can be addressed through a balanced integration of theoretical concepts, best practices, and the most effective protection techniques and programs in use today. The use cases are used to test your abilities, skills, lessons learned, and knowledge in a controlled environment by focusing on:

  • Technology refresh and change management ROI
  • Incident response and forensic investigations
  • Information data breach cost analysis
  • Intellectual Property (IP) security breach and protection

Trust an Unbiased Global View

This course is technology- and policy-agnostic. It is designed, structured, and delivered based on a blend of learning processes and real-world experiences. This ensures you get a truly unbiased world view of universally applicable information and cybersecurity principles and practices presented from a neutral, Canadian perspective.


Access a Continuum of Learning

By completing the Information and Cybersecurity Management Certificate program, you will have what you need to transition to additional learning in the field or bridge to other programs offered by PDI.

The Information and Cybersecurity Management Program is an integral part of a continuum of learning ecosystem in security, cybersecurity, and other disciplines offered by the University of Ottawa Professional Development Institute (PDI). The knowledge, skills, and abilities you acquire through this program are complementary to other offerings in PDI’s security portfolio, including:

Financial Intelligence Specialist Program

National Security and Intelligence Advance Certificate

Coding for Veterans

Cyber Skills for Canadians

Subscribe to Our Cyber Newsletter

Explore Other Programs