IT Security and Cybercrime Prevention

Pretoria
12 March to 23 March
Overview: 

Modern has widespread, coordinated criminal effort enabled by a plethora of vulnerabilities of the Internet, browsers, operating systems, and applications that are easily exploited by cybercrime techniques. Cybercriminals have found that compromising employee endpoints is a far simpler path into the corporate network than directly attacking networks. Unpatched “zero-day” vulnerabilities allow cybercriminals to secretly install malware on end user endpoint devices and essentially gain the same level of access to the corporate network, applications, and employee data

IT Security and Cybercrime Prevention Framework focuses on using business drivers to guide cyber security activities and considering cybersecurity risks as part of the organization’s risk management processes and prevention mechanism. Through use of the Profiles, cybercrime framework help organizations align cybersecurity activities within business requirements, risk tolerances, and resources. The Board and the Executive requires that the Framework include a methodology to protect individual privacy and civil liberties when critical infrastructure organizations conduct cybersecurity prevention activities

‘’There are only two types of companies: those that have been hacked, and those that will be. Even that is merging into one category: those that have been hacked and will be again. Maintaining a code of silence will not serve us in the long run’’

Target Audience: 

This training program is intended for Investigation officials, IT Auditors, Forensic Investigators, Pathologists, managers, professionals in IT and financial accounting, cybercrime specialists, bankers, Specialists in Money Laundering prevention, those in economic and strategic positions whose main responsibility is IT Security and Cybercrime prevention.

Course Outcomes: 

Upon completing this workshop, the delegates should be able to:

  • Understand IT system security development standards with a supporting policy structure
  • Address development of an inventory of information assets, networking equipment, and business continuity planning and disaster recovery planning in view of IT security breaches
  • Draw up organization cybercrime prevention mechanism, backup and recovery plan, and restoration plan to support the critical business functions
  • Address monitoring, logging, and reporting requirements, as well as developing and implementing the monitoring architecture, policies, and standards to prevent cyber crime
  • Understand compliance auditing and measurement process, identify the process for coordinating with other compliance activities such as internal audit and regulatory initiatives