Cyber Security Compliance
Cyber Security – Misguided Perceptions
Traditional approaches to information protection leaves systems drowning in alarms and alerts and medical practice managers grasping to review processes, policies and procedures to remediate potential risk. Practices often popularise the image of a cyber breach occurring from opportunistic individuals relentlessly attacking applications on a public WIFI from an indiscrete location. The reality paints a very different picture.
Chris Ward is one of the world’s foremost authorities on Cybersecurity.… why…
- 28 Years British Military
- Created/Managed UK Military First Computer Security Incident Response Team (CSIRT)
- Exec Chair of two 5-Eyes Military Cyber Committees
- Carnegie Mellon University-Software Engineering Institute Cyber Instructor
- New Zealand Defence Force (NZDF) 10 Years
- Created/managed NZ First CSIRT in NZDF
- Wrote NZDF Cyber Warfare Doctrine
- SEI & Victoria University Wellington (VUW) Partnered-VUW Research Fellow
- Provision of Intel Agencies Training
- University of the South Pacific Lecturer in Cyber & VUW Cybir
Online, Face-to-Face, or Zoom Training Courses:
(Cyber Awareness Fundamentals for all staff in your medical practice)
This training module is for all staff within an organisation who require awareness in Cyber and its relevance in the medical practice and at home.
Traditional approaches to information protection leave systems drowning in alarms and alerts and business leaders grasping to review processes, policies and procedures to re mediate potential risk.
(A Cyber Risk Assessment)
The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro™ method developed by the Carnegie Mellon University, Pittsburgh USA.
The OCTAVE Allegro™ approach provides the Public and Private Sectors a comprehensive methodology that focuses on information assets in their operational context. Cyber risks are identified and analysed based on where they originate, at the points where information is stored, transported, and processed. By focusing on operational risks to information assets, participants learn to view risk assessment in the context of the Public and Private Sectors strategic objectives and risk tolerances.
(Creating a Computer Security Incident Response Teams)
This course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT). This course provides a high-level overview of the key issues and decisions that must be addressed in establishing a CSIRT. As part of the course, attendees will develop an action plan that can be used as a starting point in planning and implementing their CSIRT.
(Managing Computer Security Incident Response Teams)
This course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team.
The course provides insight into the work that CSIRT staff may be expected to handle. The course also provides prospective or current managers with an overview of the incident handling process and the types of tools and infrastructure needed to be effective.
(Fundamentals of Cyber Incident handling)
This course provides foundational knowledge for those in security-related roles who need to understand the functions of an incident management capability and how best to perform those functions. It is recommended for those new to incident handling or security operations work.
The course introduces the basic concepts and functions of incident management. The course addresses where incident management activities fit in the information assurance or information security ecosystem and covers the key steps in the incident handling lifecycle. Discussions include topics on security operations services, intruder threats, and the nature of incident response activities. Course modules present standard practices to enable a resilient incident management capability.
(Cyber Essentials for Medical Managers)
This course is designed for managers who need to know the fundamentals that will assist in reducing the risk of a Cyber-attacks and prepare an organisation for such an event. This course provides a high-level overview of the essential aspects to Cyber and is non-technical. decisions that must be addressed in establishing a CSIRT.