Phone: (+44) 113 216 3188
  • Email: info@koyertraining.com
Koyer Training Services
  • Home
  • About Us
  • Our Programs
  • Our Venues
  • Contact Us

Cybersecurity and Information Security Risk Management

Risk and Crisis Management October 25, 2025
Enquire About This Course

Introduction

This crucial course addresses the evolving landscape of **Cybersecurity and Information Security Risk Management**, providing a structured approach to protecting organizational data, systems, and digital assets. Participants will learn how to identify, assess, and prioritize cyber threats using recognized frameworks like NIST and ISO 27001. The training moves beyond purely technical controls to focus on the governance, compliance, and enterprise-level risk treatment required to build genuine cyber resilience. Mastery of this domain is essential for safeguarding reputation, ensuring business continuity, and meeting stringent data protection regulations globally.

Objectives

Upon completion of this course, participants will be able to:

  • Establish an effective Information Security Management System (ISMS) based on ISO 27001 or NIST Cybersecurity Framework.
  • Conduct systematic cyber risk assessment using methodologies like FAIR (Factor Analysis of Information Risk).
  • Define, implement, and audit key preventative and detective technical and administrative controls.
  • Develop and test a robust **Cyber Incident Response Plan (CIRP)** and disaster recovery capabilities.
  • Ensure compliance with key data privacy regulations (e.g., GDPR, CCPA) and security mandates.
  • Master the assessment and mitigation of third-party and supply chain cyber risk.
  • Translate complex technical vulnerabilities into clear, business-focused risk metrics for executives.
  • Develop a comprehensive vulnerability management and continuous monitoring program.

Target Audience

  • CISOs and Information Security Managers
  • IT Risk and Governance (GRC) Professionals
  • Internal and External Auditors (IT/Security Focus)
  • Data Protection Officers and Compliance Managers
  • Business Continuity and Disaster Recovery Planners

Methodology

  • Hands-on Threat Modeling and Vulnerability Prioritization Exercises
  • Group Incident Response Team (IRT) Activation Simulation (Tabletop Exercise)
  • Case Studies on Major Data Breaches (Target, Equifax) and Remediation
  • Individual Exercise: Translating a Penetration Test Report into Business Risk
  • Discussions on the Ethics of Cyber Defense and Information Sharing

Personal Impact

  • Mastery of industry-standard cyber risk assessment and management frameworks.
  • Enhanced ability to communicate complex security issues to non-technical stakeholders.
  • Acquisition of high-demand skills in cyber resilience and incident planning.
  • Improved professional credibility in supporting data protection and compliance.
  • Confidence in leading the organization's response to a major cyber event.

Organizational Impact

  • Significantly reduced probability and financial impact of costly data breaches and system failures.
  • Enhanced organizational reputation and stakeholder trust in data security.
  • Compliance with global data privacy laws, minimizing regulatory fines and litigation.
  • Systematic, risk-based investment in security controls, optimizing expenditure.
  • Faster and more effective response and recovery from cyber incidents, ensuring business continuity.

Course Outline

Unit 1: Cyber Risk Governance and Strategy

Frameworks and Policy
  • Defining cyber risk, information security, and the business impact of breaches.
  • Overview of key security frameworks: **NIST Cybersecurity Framework (CSF)** and **ISO 27001**.
  • Establishing information security roles, responsibilities, and accountability (Three Lines of Defense).
  • Developing the Information Security Policy, standards, and guidelines.
  • Integrating cyber risk reporting into the Enterprise Risk Management (ERM) program.

Unit 2: Threat Modeling and Risk Assessment

Identification and Analysis
  • Techniques for threat modeling and vulnerability identification (e.g., penetration testing results).
  • Applying quantitative risk methodologies like **FAIR (Factor Analysis of Information Risk)**.
  • Categorizing and assessing the confidentiality, integrity, and availability (CIA) impact of security risks.
  • Managing human factors: social engineering and insider threat risk assessment.
  • Developing a prioritized cyber risk register based on business criticality.

Unit 3: Control Design and Implementation

Defense-in-Depth
  • Designing security controls based on the **Defense-in-Depth** principle.
  • Key control domains: access control, encryption, network security, and configuration management.
  • Managing patching and **Vulnerability Management** programs.
  • Implementing effective Security Awareness and Training (SA&T) programs.
  • Measuring the operating effectiveness of technical security controls.

Unit 4: Third-Party and Compliance Risk

External Exposures
  • Conducting third-party cyber risk assessments and due diligence (vendor security review).
  • Managing the cyber risks introduced through the software supply chain.
  • Compliance with **GDPR, CCPA**, and other data protection and breach notification laws.
  • Liaison with legal and regulatory teams on incident disclosure requirements.
  • Ensuring adherence to industry-specific security mandates (e.g., PCI DSS, HIPAA).

Unit 5: Incident Response and Resilience

Preparedness and Recovery
  • Developing the **Cyber Incident Response Plan (CIRP)** and tabletop exercises.
  • Establishing the Incident Response Team (IRT) roles and communication protocols.
  • Containment, eradication, and recovery strategies for major cyber incidents (e.g., ransomware).
  • Post-incident review, root cause analysis, and updating security controls.
  • Integrating cyber resilience with overall Business Continuity Management (BCM).

Ready to Learn More?

Have questions about this course? Get in touch with our training consultants.

Submit Your Enquiry

Upcoming Sessions

23 Mar

Manchester

March 23, 2026 - March 27, 2026

Register Now
13 Apr

Milan

April 13, 2026 - April 17, 2026

Register Now
04 May

Bangkok

May 04, 2026 - May 08, 2026

Register Now

Explore More Courses

Discover our complete training portfolio

View All Courses

Need Help?

Our training consultants are here to help you.

(+44) 113 216 3188 info@koyertraining.com
Contact Us
© 2025 Koyer Training Services - Privacy Policy
Search for a Course
Recent Searches
HR Training IT Leadership AML/CFT