Designed to be clear and accessible to Victorian businesses, regardless of size, technical expertise or and industry sector, the Cyber Security Readiness module is focused on creating a culture of cyber readiness within each participating organisation.
Organisations of all sizes are facing unprecedented cybersecurity threats that result in compromised data, loss of income and reputational damage. These threats can be met head on with the right knowledge, preparation, and culture of awareness.
This module is designed to be clear and accessible to Victorian businesses, regardless of size, technical expertise, and industry sector. It is focussed on creating a culture of cyber readiness within each participating organisation.
Course facilitator, GTPA is a Cyber Readiness Champion and a partner organisation of the US-based Cyber Readiness Institute (CRI), an organisation internationally recognised for superior cybersecurity training by, amongst others, Master Card and Microsoft.
Webinar 1: What it means to be cyber ready
Cyber readiness encompasses a range of factors, including awareness of cyber threats, understanding of terminology, keeping up to date with technology and implementing mitigation strategies.
This session will provide an overview and lay the ground work for participants to become cyber ready.
Topics include:
- What is cybersecurity?
- Overview of cybersecurity terminology
- Overview of current threats
- Basic mitigation strategies
Webinar 2: Overview of current threat landscape
Key topics explored in this session:
- Most dangerous virus and malware threats 2022.
- Australian threat overview.
- Key cyber attacks in 2022.
Webinar 3: Building an incident response plan
Being prepared is the key to successfully averting and dealing with cyber attacks and avoiding panic and confusion when a threat is experienced.
Participants in this webinar will be given practical instructions to formulate and implement an incident response plan.
Topics include:
- documenting the common types of security incidents
- prioritising security incidents based on their severity
- creating an incident response flowchart with the steps to follow
- conducting mock-ups and training your staff
- logging the incident
- the importance of updating your incident response plan.
Webinar 4: The CORE Four
Cyber threats can be broken down into four main categories.
- Passwords.
- Software updates.
- Phishing.
- USBs & removable media.
These webinars will explain each and walk participants through dealing with resulting breaches.
Webinar 5: Effective Change Management
The principles of change management apply to changing cyber behaviour. The key is identifying a leader with the organisation and having them lead the entire team along a pathway to cybersecurity.
Topics include:
- Identifying a Cyber Leader.
- Creating cyber awareness across the organisation.
- Focussing on communication.
Webinar 6: Cyber leader certification
Topics:
- Overview of the Cyber Leader Certification Program
- Application process