Cybersecurity Incident Response, Forensic Analysis And Compliance 14 CPEs (18 - 19 July 2024) St. Giles Boulevard Hotel, Kuala Lumpur

OVERVIEW



Cyber breaches can cost an organisation millions of dollars in repairs and recovery, and it is unsure if the organisation can even fully recover back to its pre-incident state. No one can predict or pick when an organization will face a major cyber incident, but one can choose the level of preparedness when incident takes place. While there are broad technical aspects to cyber incidents, there is also a myriad of other activities that generally falls to executives, managers, legal, press, and human relations staff. These include communicating both internally and externally, considering the battle rhythm and taking a look at methodologies for tracking information gathered and released to the public.


Cyberattacks: It’s Not The Matter Of If, But When...


The cybersecurity response process begins with the initial incident assessment, where incidents are detected, reported, and triaged. Once an incident is identified, the investigation moves on to evidence preservation, emphasizing the importance of maintaining the integrity and chain of custody of potential evidence. Response methodology plays a crucial role in gathering information and conducting forensic analysis. This involves collecting and analysing data, examining network traffic and logs, and interviewing witnesses and involved parties. The goal is to identify attack vectors, entry points, and potential sources of compromise. Having a cybersecurity incident response process is crucial for organizations to effectively respond to cyber threats. By following a structured response process, organizations can uncover critical information about the incident, apply appropriate remediation measures, and prevent future occurrences. A robust cybersecurity response process is a cornerstone of an organization's overall cybersecurity strategy.


This 2 days training endeavours to help those whose roles may require them to respond to a cyber-attack or breach. Participants will gain the knowledge and skills necessary to establish a prompt and effective response to cybersecurity incidents. This response aims to minimize the damage caused by the attack by swiftly identifying and containing the incident during the investigation phase. Through these proactive measures, organizations can prevent the escalation of the incident, including further compromise of systems, data theft, financial losses, and reputational damage. This course empowers you to become an effective incident management team member or leader and ensure a clear understanding of the different issues facing incident commanders. As well as becoming comfortable with terminology, you will understand what preparatory work you can undertake at different stages to help you get ahead of the situation.


HIGHLIGHT: Case scenarios, group discussions, team-based exercises on designing & implementing a response framework and building an effective cyber response team.



LEARNING OBJECTIVES

  • IDENTIFY the types of cyber threats, where and how to track the incident
  • UNDERSTAND the issues and challenges in handling security incidents
  • ESTABLISH security incident processes, policies, and procedures
  • DEFINE the incident management team's objectives
  • RECOGNISE the importance of managing team under pressure
  • GUIDE on Knowledge in the communication and coordination issues
  • PROVIDE information to Cyber Security Incident Response Team (CSIRT)
  • PLAN and control communication with stakeholders when managing incident
  • ANALYSE and assess the impact of computer security incidents
  • BUILD and test responses for various types of computer security incidents


 


CLICK HERE to see more 


Other Workshops:

May 14, 2025
OVERVIEW In recent years, the issue of “internal control” has become more significant within organisation. How to strengthen your internal control system? A strong internal control system is one of the best mitigation strategies for managing internal operational and financial risks. Effective internal controls can assist an organisation to protect itself against misuse, loss of its assets and also manage its assets in a more effective and efficient manner. Additionally, putting the right effective internal controls in place can help alert management to potential problems, reducing the probability of unnecessary financial loss due to operational or regulatory non-compliance issues. This workshop aims to convince you of the importance of effective internal controls for financial, operational and compliance reasons with a practical focus to enable you to apply effective control practices at your workplace. Attending this 2-day instructor-led training programme will equip you with relevant risks and controls knowledge to enable you to identify control weaknesses, as well as implement effective control activities for the common core business processes (namely procurement, payment, revenue, receipts, inventory and fixed asset management ) found in a typical organisation. You will also learn to develop your own Internal Controls Checklists to evaluate internal control practices currently implemented in your organisation.
May 13, 2025
OVERVIEW How will risk management and internal audit professionals leverage its capabilities and address its risks? “Risk Management and Internal Audit professionals have been talking about Chat GPT. Many are curious about how it can enhance risk management and internal audit work, be it risk assessment or report writing. If you haven’t heard of it, where have you been ?" As technology continues to evolve, risk management & internal audit professionals are constantly on the lookout to implement new tools to improve the efficiency of their work . The incorporation of Artificial Intelligence (AI) tools, such as ChatGPT, has the potential to bring about huge benefits to the industry. ChatGPT represents a prime example of AI technology that warrants close monitoring in the coming year as its many benefits continue to unfold. Before diving into the opportunities and risks of using ChatGPT in the audit process, it is important to understand what we are dealing with. ChatGPT is essentially language model developed by OpenAI. It has been trained on vast amounts of data and is able to understand and respond to human language to complete various language-based tasks. For example: answering questions, writing, researching & summarizing information. ChatGPT is a great tool that can assist day-to-day risk management & internal audit work. Nevertheless, it is crucial to acknowledge its limitations and maintain professional scepticism when using it. By incorporating appropriate safeguards, ChatGPT can increasingly support risk management & internal audit functions, resource optimization, and knowledge development. Favourite Asked Questions: • How can risk management & internal audit professionals leverage ChatGPT? • What are ChatGPT’s limitations? • What are the risks of using ChatGPT in risk management & internal audit work? • Should risk management & internal audit professionals be concerned that ChatGPT would replace them in their organisations? The new language technology is a big leap forward, but are you ready to take advantage of its rapid development and leverage its capabilities and address its risks? Our 1 Day Practical Application of ChatGPT in Risk Management and Internal Audit course provides participants with a focused understanding of how ChatGPT, a cutting-edge language model, can be effectively used in risk management and internal audit processes . There will be mini lectures, interactive discussions and practical exercises using ChatGPT for risks and internal audit tasks. SIGN UP with us if you are MAD enough. MAD stands for “ Making a Difference ” if your organization wants your employees to gain the knowledge and skills required to integrate ChatGPT into their risk management and internal audit functions, optimising decision-making and enhancing overall effectiveness.