Cyber & IT Risks
"Cyber & IT Risks" Module is part of the "Certified Chief Risk Officer (C-CRO)" and the "Certified Operational Risk Officer (C-ORO)" training programs.
Description
Target Audience
Subject Areas
- What is Cyber and IT Risk and relation with ERM
- IT Risk is a business Risk embedded in ERM
- IT Risk Frameworks and Best Practices
- Duality of Risk - Opportunities and Risk
- Three Lines of Defense
- Risk Appetite and Risk Tolerance
- Digital Transformation and Risk
- Opportunities and Risk of a BPR
- New trends of Cyber & IT Risks (BYOD, Social Media, Cloud Computing, Internet of Things, Big Data)
- How can we identify Cyber & IT Risks
- Collect and review Enterprise information - Objectives, Operations, Various business IT Environments
- Identify potential threats and vulnerabilities
- How to develop a set of IT Risk Scenarios
- Identify key stakeholders of IT Risks
- Identify risk appetite and risk tolerance
- Establish the IT Risk Register
- Develop a Risk Awareness Program for the Enterprise
- How can we perform IT Risk Assessment
- Analyze risk scenarios and identify likelihood and impact
- Review Controls - Prepare gap analysis
- Assign Risk Ownership to establish accountability
- Update Risk Register
- Communicate RA to Management
- How to Determine Risk Response and Mitigate Risk
- Action Plan with Risk Owners and Business Objectives
- Risk Response Selection and Prioritization
- Ensure controls ownership and risk accountability
- Consult/review/develop control procedures
- Update Risk Register
- Continuously Monitor and Report IT Risk
- Methods to Monitor Cyber & IT Risk
- Risk awareness - Risk Culture KPIs, KRIs, Management Review, Risk Profile changes
What you will learn
This educational seminar is not a theoretical presentation. The participants will receive from the trainer real life working knowledge of the risks that companies face today from the use of IT and Internet. They will also receive real life hands-on working methodolgy and tools used by IT Risk Managers globally to manage effectively those risks. Knowledge is based on best practice globally recgnised IT Risk Management frameworks.
Seminar Timetable
Date | 1st & 2nd Teaching Hour | Break | 3rd & 4th Teaching Hour |
---|---|---|---|
11th of February | 18.30 - 20.00 | 20:00 - 20:15 | 20.15 - 21.45 |
13th of February | 18.30 - 20.00 | 20:00 - 20:15 | 20.15 - 21.45 |
17th of February | 18.30 - 20.00 | 20:00 - 20:15 | 20.15 - 21.45 |
Course Start Date
11 of February 2025
Cost of Attendance
- 20 Hours
- Live Online
- Attendance Certificate
Lecturer
Andreopoulos MScChief Information Security Officer, Regnology Group Gmbh
Chief Information Security Officer, Regnology Group Gmbh
Konstantinos Andreopoulos is a C-Level Professional, with studies in Computer & Informatics Engineer (University of Patras) and holds the Inter-University Master of Science – MBA & Technology. He has active top professional certifications in the field of Information Security and Risk Management–, Certified in Risk and Information Systems Controls/CRISC, Certified Information Security Manager/CISM, Certified ISO27001 Lead Implementer/ISO27001LI and Certified Information Systems Auditor/CISA. Since 2022 he holds the role of the Chief Information Security Officer and Head of Risk and Quality Management in Regnology Group, a multinational company, leader in Regulatory Reporting with over 3000 Banks and Regulatory Authorities customers worldwide. Konstantinos has more than 20 years of professional experience in Information and Technology Management acquired in various locations across Europe. Previous employers include European Central Bank (ECB), ICAP CRIF, VIANEX Pharmaceuticals and others.