Cybersecurity Incident Response, Forensic Analysis and Compliance (23-24 April 2026) St. Giles Boulevard Hotel, Kuala Lumpur

OVERVIEW



Cyber breaches can cost an organisation millions of dollars in repairs and recovery, and it is unsure if the organisation can even fully recover back to its pre-incident state. No one can predict or pick when an organization will face a major cyber incident, but one can choose the level of preparedness when incident takes place. While there are broad technical aspects to cyber incidents, there is also a myriad of other activities that generally falls to executives, managers, legal, press, and human relations staff. These include communicating both internally and externally, considering the battle rhythm and taking a look at methodologies for tracking information gathered and released to the public.


Cyberattacks: It’s Not The Matter Of IF, But WHEN...


The cybersecurity response process begins with the initial incident assessment, where incidents are detected, reported, and triaged. Once an incident is identified, the investigation moves on to evidence preservation, emphasizing the importance of maintaining the integrity and chain of custody of potential evidence. Response methodology plays a crucial role in gathering information and conducting forensic analysis. This involves collecting and analysing data, examining network traffic and logs, and interviewing witnesses and involved parties. The goal is to identify attack vectors, entry points, and potential sources of compromise. Having a cybersecurity incident response process is crucial for organizations to effectively respond to cyber threats. By following a structured response process, organizations can uncover critical information about the incident, apply appropriate remediation measures, and prevent future occurrences. A robust cybersecurity response process is a cornerstone of an organization's overall cybersecurity strategy.


This 2 days training endeavours to help those whose roles may require them to respond to a cyber-attack or breach. Participants will gain the knowledge and skills necessary to establish a prompt and effective response to cybersecurity incidents. This response aims to minimize the damage caused by the attack by swiftly identifying and containing the incident during the investigation phase. Through these proactive measures, organizations can prevent the escalation of the incident, including further compromise of systems, data theft, financial losses, and reputational damage. This course empowers you to become an effective incident management team member or leader   and ensure a clear understanding of the different issues facing incident commanders. As well as becoming comfortable with terminology, you will understand what preparatory work you can undertake at different stages to help you get ahead of the situation.


HIGHLIGHT: Case scenarios, group discussions, team-based exercises on designing & implementing a response framework and building an effective cyber response team.



LEARNING OBJECTIVES

  • IDENTIFY  the types of cyber threats, where and how to track the incident
  • UNDERSTAND  the issues and challenges in handling security incidents
  • ESTABLISH security incident processes, policies, and procedures
  • DEFINE  the incident management team's objectives
  • RECOGNISE  the importance of managing team under pressure
  • GUIDE  on Knowledge in the communication and coordination issues
  • PROVIDE  information to Cyber Security Incident Response Team (CSIRT)
  • PLAN  and CONTROL communication with stakeholders when managing incident
  • ANALYSE  and ASSESS the impact of computer security incidents
  • BUILD  and TEST responses for various types of computer security incidents


 

CLICK HERE to see more!



Other Workshops:

Financial Statement, Cash Flow & Budget Plan
By Rentech Solutions February 16, 2026
2-day intensive training event, "Financial Statement, Cash Flow & Budget Plan for Non Finance Leaders", focuses on financial intelligence, including how to read, analyze, and interpret financial statements, cash flow, and budgets. HRD Corp claimable course. Register now!
February 15, 2026
OVERVIEW Protect Your Business Against Expensive Malpractices and Fraudulent Behaviour The rise in contract management and the outsourcing of goods and services has created an increase in procurement fraud, which can occur at any stage of the contracting and procurement process. Appropriate controls, fraud prevention strategies and proper tendering processes are necessary in the fight against this fraud. It is important to remember that maintenance of financial controls remains critical in this age of digitalisation. Public and private sectors must continue to comply with legal responsibilities and related guidance on financial governance. It is essential that all staff maintain financial records and decision logs – regardless of any circumstances - so that audit trails are preserved . Procurement, finance, and payroll staff, as well as those who requisition or authorise the purchase of goods, services and works should familiarise themselves with the controls set out to prevent fraud , identify key parameters for auditors in assessing the risk of sub-optimal procurement, and how they should prioritise and conduct their audits to check if these risks have materialised, including the risk of fraud and corruption. Procurement fraud can occur through departmental purchasing of goods and services, as well as through contractual arrangements with external service providers. It can occur in many different ways. Fraud within the procurement life cycle is high risk and can result in recurring losses. You may be at risk due to fraudulent activities conducted by internal staff, collusion between internal staff and external service providers or external service provider or industry collusion. This workshop offers insight into the specific risks and possible management techniques in procurement in good or tough times. This 14 hours training programme would equip participants with the knowledge, skills, and techniques to deter, prevent, and detect various devastating types of fraud. JOIN US to learn how to identify procurement fraud situations, uncover rogue operatives and threats and provide a higher level of transparency and control over all elements of your purchasing requirements.
By Rentech Solutions February 14, 2026
OVERVIEW In today's fast-paced business landscape, HR professionals are constantly balancing multiple responsibilities while striving for efficiency and innovation . With the rapid evolution of technology, a new era of tools powered by Artificial Intelligence (AI) is transforming the way HR teams operate - from talent acquisition to employee engagement. Rather than just being buzzwords, tools like ChatGPT, DALL-E, Gamma, Gemini, CoPilot, and NotebookLM offer practical, time-saving solutions that empower HR professionals to do more, with less effort and better outcomes. What Can These AI Tools Do for HR? TOP 4 ways ChatGPT supports HR: Speeds up resume screening and shortlisting Automate responses to common employee or candidate questions Prepares customized interview questions and scorecards Helps create onboarding and training documentation TOP 4 ways DALL-E supports HR: Generates creative visuals for job ads or internal campaigns Elevates employer branding with striking imagery Illustrates training concepts with custom art Designs personalized recognition graphics for milestones or awards And that's just the beginning - you'll also explore powerful tools like Gamma, Gemini, CoPilot, NotebookLM, and more to supercharge your HR strategies. Elevate your HR practices with cutting-edge AI technology! JOIN US for a specialized 2-day training module created for forward-thinking HR professionals who are ready to unlock the full potential of AI in their workflows. Discover how AI can streamline processes, enhance employee engagement, and revolutionize the way you manage HR functions, all while maintaining privacy and adhering to governance standards. Let AI be your strategic ally in modern HR management. Don't just keep up - lead the transformation.