Resilia - Cyber Security Foundation

Request more details:

submit request
Description:
As the range and complexity of cyber threats and vulnerabilities has increased, the approach to managing the associated risks has also evolved and matured. RESILIA™ is a complete, collaborative risk-based approach driven by the Board but involving everyone across the organisation and extending to partners, supply chain and customers. It requires moving away from strategies that seek solely to protect the business to an approach that includes preparing for, and recovering from, a cyber-attack.
Prerequisites:
Upon completion of the training and examination related to this qualification, a successful candidate will be familiar with the:

General understanding of cyber resilience
Purpose of risk management and how to do it
Purpose of each lifecycle stage
Key features of each control
Interactions between cyber resilience and ITSM
Objectives:
Describe what cyber resilience is
Identify the benefits
Identify terms
What is the purpose of balancing:
Preventative detective, and corrective controls
People, process, technology
Risks and opportunities
Identify the need for:
Confidentiality
Integrity
Availability
Authentication
Nonrepudiation
Introduction to Cyber Resilience :
Describe what risk management is
Identify the purpose
Identify terms
Describe actions to address risks and opportunities
Risk Management :
Identify the purpose and scope of a management system
Identify the components of a management system
Recognize the relevance of common management standards and best practice frameworks to cyber resilience
Describe the difference between management, governance and compliance
Managing Cyber Resilience:
Identify what cyber resilience strategy is intended to achieve
Identify cyber resilience activities that should be aligned with IT service strategy
Describe the purpose and key features of the control objectives
Identify interactions between ITSM processes and cyber resilience
Cyber Resilience Strategy:
Identify what cyber resilience design is intended to achieve
Identify cyber resilience activities that should be aligned with IT service design
Describe the purpose and key features of the control objectives
Identify interactions between ITSM processes and cyber resilience
Cyber Resilience Design :
Identify what cyber resilience transition is intended to achieve
Describe the purpose and key features of the control objectives
Identify interactions between ITSM processes and cyber resilience
Cyber Resilience Transition:
Identify what cyber resilience operation is intended to achieve
Describe the purpose and key features of the control objectives
Identify interactions between ITSM processes and cyber resilience
Cyber Resilience Operation:
Identify what cyber resilience continual improvement is intended to achieve
Recognise maturity models and their purpose
Describe the purpose and key features of the control objectives


Describe how the seven-step improvement process can be used to plan cyber resilience improvements
Describe how to use ITIL CSI approach to plan cyber resilience improvements
Cyber Resilience Continual Improvement :
Describe segregation of duties and dual controls