
Cyber & IT Risks
"Cyber & IT Risks" Module is part of the "Certified Chief Risk Officer (C-CRO)" and the "Certified Operational Risk Officer (C-ORO)" training programs.
Description
Target Audience
Subject Areas
- What is Cyber and IT Risk and relation with ERM
- IT Risk is a business Risk embedded in ERM
- IT Risk Frameworks and Best Practices
- Duality of Risk - Opportunities and Risk
- Three Lines of Defense
- Risk Appetite and Risk Tolerance
- Digital Transformation and Risk
- Opportunities and Risk of a BPR
- New trends of Cyber & IT Risks (BYOD, Social Media, Cloud Computing, Internet of Things, Big Data)
- How can we identify Cyber & IT Risks
- Collect and review Enterprise information - Objectives, Operations, Various business IT Environments
- Identify potential threats and vulnerabilities
- How to develop a set of IT Risk Scenarios
- Identify key stakeholders of IT Risks
- Identify risk appetite and risk tolerance
- Establish the IT Risk Register
- Develop a Risk Awareness Program for the Enterprise
- How can we perform IT Risk Assessment
- Analyze risk scenarios and identify likelihood and impact
- Review Controls - Prepare gap analysis
- Assign Risk Ownership to establish accountability
- Update Risk Register
- Communicate RA to Management
- How to Determine Risk Response and Mitigate Risk
- Action Plan with Risk Owners and Business Objectives
- Risk Response Selection and Prioritization
- Ensure controls ownership and risk accountability
- Consult/review/develop control procedures
- Update Risk Register
- Continuously Monitor and Report IT Risk
- Methods to Monitor Cyber & IT Risk
- Risk awareness - Risk Culture KPIs, KRIs, Management Review, Risk Profile changes
What you will learn
This educational seminar is not a theoretical presentation. The participants will receive from the trainer real life working knowledge of the risks that companies face today from the use of IT and Internet. They will also receive real life hands-on working methodolgy and tools used by IT Risk Managers globally to manage effectively those risks. Knowledge is based on best practice globally recgnised IT Risk Management frameworks.
Seminar Timetable
Date | 1st & 2nd Teaching Hour | Break | 3rd & 4th Teaching Hour |
---|---|---|---|
16th of February | 18.30 - 20.00 | 20:00 - 20:15 | 20.15 - 21.45 |
20th of February | 18.30 - 20.00 | 20:00 - 20:15 | 20.15 - 21.45 |
22nd of February | 18.30 - 20.00 | 20:00 - 20:15 | 20.15 - 21.45 |
26th of February | 18.30 - 20.00 | 20:00 - 20:15 | 20.15 - 21.45 |
28th of February | 18.30 - 20.00 | 20:00 - 20:15 | 20.15 - 21.45 |


Course Start Date
16 of February 2024
Cost of Attendance
- 20 Hours
- Live or Online
- Attendance Certificate
Lecturer

Andreopoulos MScGroup IT Director & Chief Officer, ICAP CRIF
Group IT Director & Chief Officer, ICAP CRIF
Konstantinos Andreopoulos is a Computer & Informatics Engineer (University of Patras) and holds the Inter-University Master of Science – MBA & Technology. He has active top professional certifications in the field of Information Security – Certified Information Security Manager, Certified ISO27001 Implement Leader and Certified Information Systems Auditor. Since 2015 he is the Chief Information Security Officer of ICAP Group of Companies while at the same time he is the Director of IT Infrastructure and Operations. In 2018, certified the group's companies according to the ISO27001:2013 standard, while in the same year he certified the group's Call Center – ICAP Outsourcing Solutions according to the PCI standard – for certified secure credit card transactions. He has 20+ years of professional experience in Information and Technology Management acquired in Athens and Frankfurt where he served as Senior Systems Engineer at the European Central Bank (ECB) and was responsible for the security policies of IT systems in the European System of Central Banks