top of page
Command & Conquer
Command & Conquer

We are working on the details

|

Location is TBD

Command & Conquer

An interactive workshop dedicated to the C-Suite. This course was created to equip decision-makers with the knowledge to manage cyber incidents in organizations.

We do not sell tickets
See other events

Time & Location

We are working on the details

Location is TBD

About the event

Training Goal:

is designed specifically for executives to enable them to effectively manage cybersecurity incidents. During the training, participants will gain knowledge about different types of security incidents, their impact on business and the key role they play in managing them. Additionally, participants will have the opportunity to participate in a security incident simulation, which will allow them to apply the acquired knowledge in practice. The training is aimed not only at increasing personal competences, but also at increasing the organization's resilience to cyber incidents.

Training program:
  1. Introduction: Discussion of the main goals and structure of the training. Emphasizing the importance of the C-suite's role in managing cybersecurity incidents.
  2. Understanding Security Incidents: Definition and characteristics of security incidents, including various types such as phishing, malware, ransomware, etc. Analyzing the impact of security incidents on business operations and company reputation.
  3. The C-Suite's Role in Security Incident Management: An introduction to senior management strategy and decision-making during an incident. Discussion of responsibilities related to internal and external communication and crisis management.
  4. Incident Response Process: An overview of the steps involved in incident response: preparation, identification, response, recovery, recovery, and conclusion analysis. Discussion of practical steps and best practices in each phase.
  5. Interactive Workshops: Simulations of cyber attack scenarios. Incident management workshops
  6. Summary and Discussion: Key Takeaways and Best Practices Question and Answer Session

Training methodology:

The training combines theoretical presentations with interactive practical workshops, enabling participants to acquire both theoretical knowledge and practical skills. The classes will be conducted by experienced specialists in the field of cybersecurity, using the latest tools and technologies.

Who is this training for?

The training is aimed at:

  • High-level staff
  • Experienced managers

Share this event

bottom of page