2017 will be remembered as the year of ransomware attacks, massive data breaches, supply chain threats and a catalogue of destructive cyber-attacks which placed the importance of robust Cyber Security at the centre of business strategy. We also witnessed a new calibre of data breach and cyber outrage, the WannaCry ransomware attack launched in May spread rapidly with over 300,000 devices quickly infected, spanning 150 countries and affecting critical services across the world, including the NHS. This attack demonstrated the real-world harm that can result from security breaches particularly when they are designed to self-replicate and spread and reinforced the vital necessity for businesses of all sizes to be prepared. 

Cyber-attacks are also resulting in significant financial losses to businesses of all sizes. The costs arise from not just the attack itself but repairing reputational damage caused by regaining public trust. 

Course Outline

This 1 day course curriculum will include the following learning modules:

An introduction
- current threat landscape including terminology and recent cybersecurity threats, keeping up to date. 
- authentication: access control, passwords, two-factor authentication
- malware: types of malware, attack vectors, preventing infection
- networking and communications: fundamentals, security challenges, standards

Recognising and understanding Cyberthreats
- Understanding the real threats we face today by defining what hackers are, their motivations, and the tools they deploy
- understand the processes involved in a hacking attack including footprinting, port scanning, network sniffing, phishing, social engineering, dumpster diving and physical attacks.

The basics of Information Security
- explain the basics of Information Security
- learn how an organization might approach the task of securing their networks and minimizing potential attacks. - - learn about the creation of an ISMS, risk management, the implementation of security controls, penetration testing and incident management.

Case studies, Q & A and summary

Richard Paylin is Global Client Director at Check Point Software Technologies a Global Leader in Cyber Security. Richard is a leading adviser and consultant in Cybersecurity prevention and advises companies of all sizes to minimize threats to Cyber attacks.

Check Point Software Technologies Ltd is recognized as the largest pure-play security vendor globally, and provides industry-leading solutions, and protects customers from cyber attacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management.

What are my transport options for getting to and from the training venue, WeWork, 30 Stamford Street?

The best public transport options are Blackfriars (mainline, district and circle lines) accessible via Blackfriars Bridge and Waterloo stations (mainline, northern) are also less than half a mile away giving the property a great selection of transport options.

Is there any preparation required in advance of the course?

The course does not require you to prepare or bring anything in advance.

How can I contact the organizer with any further requirements questions?

Yes. We would be delighted to help if you have any questions about the course contents, group bookings or any other questions.