Cybersecurity Risk & Compliance 14 CPEs (21 - 22 August 2023) The Gardens Hotel, Kuala Lumpur

OVERVIEW



In today's digital landscape, the protection of networks and data access has become a critical concern for organizations of all sizes. Cyber threats have become more sophisticated and prevalent, making it imperative for companies to proactively manage cybersecurity risks as a crucial aspect of their operations.


However, relying solely on technological solutions is no longer enough to combat cyber threats. Organizations need to actively manage cybersecurity risks by adopting a comprehensive approach that combines people, processes, and technology. This approach will help organizations stay ahead of cyber threats, minimize the impact of potential breaches, and maintain business continuity.


Our cybersecurity program is designed to equip organizations with the necessary knowledge and skills to manage cybersecurity risks effectively. Our program covers a wide range of topics, including threat intelligence, risk management, incident response, and compliance with cybersecurity regulations. Our experienced trainer will guide you through a hands-on training program that will help you develop the necessary skills to manage cybersecurity risks in your organization.


By completing our program, you will gain a comprehensive understanding of cybersecurity risks and learn how to identify and manage them proactively. You will be equipped with the skills to develop and implement a cybersecurity program that aligns with industry standards and regulatory requirements, enhancing your organization's cybersecurity posture.



LEARNING OBJECTIVES


 

  • UNDERSTAND the current threat landscape and its impact to the business
  • ASSESS the risks of emerging threats profiles to your organisation
  • COMPREHEND cyber threats and controls, such as viruses, phishing scams, and social engineering threats
  • ANALYZE the development of cybersecurity over time and its impact through case studies
  • EVALUATE the impact of cyber attacks and identify business process and recovery priorities
  • ADHERE to regional cybersecurity, computer crime, and data protection laws and regulations
  • EXPLORE the challenges of investigating a cyber breach and its penalties
  • RECOGNIZE best practices in cybersecurity, including ISO27001, NIST, COSO, and COBIT
  • COMPARE and contrast different cybersecurity practices, including cloud security, SOC, vulnerability scanning, and ethical hacking.
  • DEVELOP a cyber risk assessment and scoping for different organizations

 


CLICK HERE to see more 


Other Workshops:

September 29, 2025
OVERVIEW Protect Your Business Against Expensive Malpractices and Fraudulent Behaviour The rise in contract management and the outsourcing of goods and services has created an increase in procurement fraud, which can occur at any stage of the contracting and procurement process. Appropriate controls, fraud prevention strategies and proper tendering processes are necessary in the fight against this fraud. It is important to remember that maintenance of financial controls remains critical in this age of digitalisation. Public and private sectors must continue to comply with legal responsibilities and related guidance on financial governance. It is essential that all staff maintain financial records and decision logs – regardless of any circumstances - so that audit trails are preserved . Procurement, finance, and payroll staff, as well as those who requisition or authorise the purchase of goods, services and works should familiarise themselves with the controls set out to prevent fraud , identify key parameters for auditors in assessing the risk of sub-optimal procurement, and how they should prioritise and conduct their audits to check if these risks have materialised, including the risk of fraud and corruption. Procurement fraud can occur through departmental purchasing of goods and services, as well as through contractual arrangements with external service providers. It can occur in many different ways. Fraud within the procurement life cycle is high risk and can result in recurring losses. You may be at risk due to fraudulent activities conducted by internal staff, collusion between internal staff and external service providers or external service provider or industry collusion. This workshop offers insight into the specific risks and possible management techniques in procurement in good or tough times. This 14 hours training programme would equip participants with the knowledge, skills, and techniques to deter, prevent, and detect various devastating types of fraud. JOIN US to learn how to identify procurement fraud situations, uncover rogue operatives and threats and provide a higher level of transparency and control over all elements of your purchasing requirements.
The Power of Training Need Analysis To Drive Success: 
Identifying and Addressing Key Training Needs
By Rentech Solutions September 29, 2025
Join us for "The Power of Training Needs Analysis to Drive Success". Learn to identify and address key training needs, boost organizational performance. HRD Corp claimable course. Register now!