RESILIA Foundation 3 Days Training in Christchurch

RESILIA Foundation 3 Days Training in Christchurch

By Mangates

Date and time

September 2, 2020 · 9am - September 4, 2020 · 5pm NZST

Location

Regus - Christchurch, Awly Building

Level 1, Awly Building, 287-293 Durham Street North Christchurch, 8013 New Zealand

Refund Policy

Refunds up to 7 days before event

Description

Course Description:

AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management and business. Active cyber resilience is achieved through people, process, and technology.

The RESILIA TM Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities.

Course Topics:

Module 1 : Course Introduction

● Course Learning Objectives

● Course Agenda

● Activities

● Course Book Structure

● RESILIA Certification

Module 2 : Introduction to Cyber Resilience

● What is Cyber Resilience?

● Defining Cyber Resilience

● Balancing in Cyber Resilience

● Characteristics of Cyber Resilience

Module 3 : Risk Management

● Understanding Risk Management: Discussion

● Defining Risk Management

● Addressing Risks and Opportunities

Module 4 : Managing Cyber Resilience

● Why and What of Management Systems?

● Management Systems

● Common Management Standards and Frameworks

Module 5 : Cyber Resilience Strategy

● What is Strategy?

● Cyber Resilience Strategy and Activities

● Security Controls at Cyber Resilience Strategy

● Interaction Between ITSM Processes and Cyber Resilience

Module 6 : Cyber Resilience Design

● Why Cyber Resilience Design?

● Cyber Resilience Design Activities

● Security Controls at Cyber Resilience Design

● Aligning ITSM Processes with Cyber Resilience Processes

Module 7 : Cyber Resilience Transition

● Why Cyber Resilience Transition?

● Basics of Cyber Resilience Transition

● Cyber Resilience Transition: Controls

● Interaction Between ITSM Processes and Cyber Resilience

Module 8 : Cyber Resilience Operation

● The Purpose of Cyber Resilience Operation

● Security Controls in Cyber Resilience Operation

● Interaction Between IT Processes and Cyber Resilience

● Interaction Between ITSM Functions and Cyber Resilience

Module 9 : Cyber Resilience Continual Improvement

● Continual or Continuous Improvement

● Maturity Models

● Continual Improvement Controls

● The Seven-Step Improvement Process

● The ITIL CSI Approach

Module 10 : Cyber Resilience Roles & responsibilities

● Segregating Duties

● Dual Controls

Learning Goals:

● Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience.

● Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities.

● Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute.

● Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities.

● Demonstrate your knowledge of cyber resilience design, the associated control objectives and their interactions with ITSM activities.

● Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities.

● Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities.

● Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities.

● Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls.

Course Agenda:

Day 1

● Course Introduction

● Intro to Cyber Resilience

● Risk Management

● Managing Cyber Resilience

● Cyber Resilience Strategy

● Cyber Resilience Design

● End of Day Case Study Assignment

Day 2

● Cyber Resilience Design

● Cyber Resilience Transition

● Cyber Resilience Transition

● Cyber Resilience Operation

● End of Day Case Study Assignment

Day 3

● Cyber Resilience Operation

● Cyber Resilience Continual Improvement

● Cyber Resilience Roles and Responsibilities

● Exam Preparation Guide

Who can Attend?

The RESILIA TM Foundation course audience includes all teams across the IT and Risk functions, including:

● IT Service Management

● Operations and Incident Management

● IT Change and Release Management

● IT Supplier and Vendor Management

● Business Analysis and Design

● Business Analysts

● IT Architects

● Development

● IT Project and Programme Management

● Risk and Compliance

● Information Security Management

● Business Continuity Managers

Organized by

Click here to subscribe to our text messages.

Who we are

Mangates is one of the Leading Competency developers, Mangates has developed a proven foundation for building specialized training programs. No matter which Mangates training division you are working with, you can expect the same high-quality training experience and expertise that makes Mangates stand out above the competition.

All of our instructors are recognized experts in their fields with hands-on experience on the topics they teach. We combine proven adult educational training methods with leading-edge industry expertise to provide you an exceptional training experience. Every instructor must meet rigorous standards with the proven background in their given field of expertise. It is the difference that our customers covet and participant appreciates at the completion of the course.

What we do

We deliver training solutions to Corporate, Government Agencies, Public sectors, Multinational organizations and Private Individuals. Our Primary focus is to train in a wide range of areas from IT Technical, Personal Development, Human Resources and Management Courses to Project, Program and IT Service Management.

We have most experienced trainers in the Industry. Our Trainers are highly skilled in their subject areas and are uniquely positioned to provide participants with deep industry experience. They are motivated to transfer knowledge through practical support post and pre-training to provide participants with additional support outside the classroom.

 

 

https://www.youtube.com/watch?v=ca-9iJ4zw0Q

 

Sales Ended