Acquire Cybersecurity fundamentals necessary for any digital professional and get the certification.

Meet the experts, get the knowledge, succeed the examination: This will happen in 9 weeks starting soon.

Acquire Cybersecurity fundamentals necessary for any digital professional and get the certification.
Meet the experts, get the knowledge, succeed the examination: This will happen in 9 weeks starting soon.
Image

9

SESSIONS (INCLUDING THE EXAM)


Running on Monday in Q4 2020 in Virtual workshop sessions

800+

ACADEMY GRADUATES (AND COUNTING!)


Join other graduates from Solvay Executive Education in Digital Governance and Trust and build your high-performance network

100+

LECTURERS EXPERT IN THEIR DOMAINS

 

The education is moderated by a topic leader and sessions are lectured by subject matter experts

INTRODUCING
THE SOLVAY BRUSSELS SCHOOL

CYBERSECURITY WORKSHOP
benefits obtained from this module

Running since 2015 within the Information Security Management courses at Solvay Brussels School, by attending this module you will be able to :

  • Access the fundamentals of Cybersecurity
  • Understanding of the NIST Cybersecurity framework
  • Be lectured by Senior experts and you will grasp their hands-on knowledge
  • Prepare Cybersecurity Nexus Fundamentals Certification from ISACA

Upon success at the examination session, you will get a certificate of success  delivered by Solvay Executive Education in Digital Governance and Trust.

 
key objectives
Image

  • Master the use of relevant bodies of knowledge such as best practices and latest defense frameworks in cybersecurity.
  • Become familiar with the latest attack patterns and counter-measures including predictive analytics and machine learning as preventive and detective tools.
  • Gain hands-on experience with Cybersecurity Core Functions (NIST and CSF).
  • Acquire robust knowledge towards implementing an end-to-end cybersecurity defense model at participant's company.
  • Apply company-specific cybersecurity governance to ensure decision and control bodies are in place.

Agenda of the course

Image

Session 1 - 28 Sept 2020 : Wim Bartsoen

First Core Function: Identify 

  • A Call to arms: Stop The FUD
  • A few Cases... and Lessons
  • The Amazons of Crime
  • Zooming Out: Sun Tzu’s persistent relevance
  • The Internal Drivers of exposure to Cyber Threats
  • Takeaways for A Cyber Security Strategy
Image

Track I - 30 Sept 2020

First Core Function: Identify 

  • A Call to arms: Stop The FUD
  • A few Cases... and Lessons
  • The Amazons of Crime
  • Zooming Out: Sun Tzu’s persistent relevance
  • The Internal Drivers of exposure to Cyber Threats
  • Takeaways for A Cyber Security Strategy
Image
Image

Session 2 - 05 Oct 2020: Karine Goris

Image

First Core Function: Identify (2)

  • Know your business
  • Know your people, processes and technology
  • Information security management process
  • Information security strategy & roadmap
Image

Track II - 7 Oct 2020

First Core Function: Identify (2)

  • Know you business
  • Know your people, processes and technology
  • Information security management process
  • Information security strategy & roadmap
Image

Session 3 - 12 Oct 2020: Marc Vael

Second Core Function: Protect (1)

  • NIST - National Institute of standards and Technology
  • Second Core Function: Protect (details).
  • Examples of outcome Categories within this Function
  • Adaptive security
Image

Track III - 14 Oct 2020

Second Core Function: Protect (1)

  • NIST - National Institute of standards and Technology
  • Second Core Function: Protect (details).
  • Examples of outcome Categories within this Function
  • Adaptive security
Image
Image

Track IV - 21 Oct 2020

Second Core Function: Protecct (2)

  • Cyber Resilience : A definition
  • Cyber Resilience Second Core Function: Protect
    • Technology
      • Network
      • System
      • Application
      • Other Domains
    • Processes and People
Image

Session 4 - 19 Oct 2020: Umut Inetas

Second Core Function: Protect (2)

  • Cyber Resilience : A definition
  • Cyber Resilience Second Core Function: Protect
    • Technology
      • Network
      • System
      • Application
      • Other Domains
    • Processes and People

Session 5 - 26 Oct 2020: Umut Inetas

Second Core Function: Detect

  • Stats & Subject Introduction
  • Terminology
  • Current technologies and their paradigms
  • Systems variables for detection
  • The good, the bad and the ugly
  • The future
  • Your turn - Q&A
Image

Track V - 04 Nov 2020

Second Core Function: Protect (1)

  • NIST - National Institute of standards and Technology
  • Second Core Function: Protect (details).
  • Examples of outcome Categories within this Function
  • Adaptive security
Image
Image

Session 6 - 09 Nov 2020: Ignace Caria

Image

Fourth Core Function: Respond

  • Incident Response Management Frameworks
  • Prepare your response
  • Detect the cyber threats
  • Action to take
  • Communication
  • Emerging Threats require change of approach
Image

Track VI - 18 Nov 2020

Fourth Core Function: Respond

  • Incident Response Management Frameworks
  • Prepare your response
  • Detect the cyber threats
  • Action to take
  • Communication
  • Emerging Threats require change of approach

Track VII - 25 Nov 2020

Fifth Core Function: Recover (1)

  • Are you ready?
  • Introduction
  • Planning
  • Continuous improvements
  • Metrics 
  • Building the playbook
Image
Image

Session 7 - 16 Nov 2020: Stijn Meeuws 

Fifth Core Function: Recover (1)

  • Are you ready?
  • Introduction
  • Planning
  • Continuous improvements
  • Metrics 
  • Building the playbook
Image
Image

Session 8 - 23 Nov 2020: Umut Inetas

Image

Awareness + pre test

  • Why awareness?
  • Stakeholder management
  • Behaviour change and communication
  • Know your channels
  • Reference board and roadmap
  • Approval roadmap and budget
Image

Track VIII - 2 Dec 2020

Awareness + pre test

  • Why awareness?
  • Stakeholder management
  • Behaviour change and communication
  • Know your channels
  • Reference board and roadmap
  • Approval roadmap and budget

Lecturers

Who should attend
  • Information technology professionals wishing to acquire Cybersecurity fundamentals
  • Information Security experts wishing to obtain a 360° view on Cybersecurity at a practical management workshop
  • Those wishing to master NIST Cybersecurity framework
  • Those wishing to succeed the CSX Fundamentals examination from ISACA® (link to https://www.isaca.org/credentialing/cybersecurity)

Practicalities

English

18:15 to 21:30

Each Monday starting on 28 Sept

On site

Franklin Roosevelt 42

Why solvay brussels school executive education

  • Join one of the most renowned Business School in Belgium. 
  • Receive a Solvay Brussels School certificate at the end of the module if you pass the exam.
  • We offer the full experience to our trainees: pre-readings, interactive classes, printed training material and more.
  • All of our trainers are highly experimented, and the trainings are given in limited groups to ensure a tailored course.
  • This education is part of Solvay Executive Education dedicated to Digital Governance and Trust.
  • Upon succeeding the examination, participants receive a certification of success from Solvay Executive Education.
  • Professor Georges Ataya is the founder and the academic Director of this education programme. 
  • https://exed.solvay.edu/en/13-gamme/10-digital-governance-trust

Ataya & Partners involvement

Ataya Partners promotes this education in the current circumstances in 2020. Thanks to Ataya & Partners, benefit from:
  • Consulting opportunities after taking our trainings.
  • Recruitment opportunities with Hightech Partners, our sister company specialised in executive recruitment.
  • Tailored coaching based on our new Cybersecurity skill assessment. We will help you to choose best training to improve your skills.
  • Join our community and benefit from a large cybersecurity network, interesting articles, discount on our training and many other advantages.

WHAT GRADUATES SAY ABOUT THIS WORKSHOP

The aim of the S3 module is to be as close to reality as possible. As a matter of fact, collaboration between stakeholders is key when it comes to handling cybersecurity. Participants are expected to show the same level of collaboration in the workshops

Umut Inetas - TOPIC LEADER
Image

NEED HELP OR HAVE QUESTIONS?

Image

Simona Boldrini

Principal Courses Project Manager
sb@atayapartners.com
  1. DOWNLOAD THE BROCHURE NOW 
  2. LEAVE YOUR BEST EMAIL AND TELEPHONE NUMBER
  3. YOU WILL BE CONTACTED BY OUR COURSE MANAGER IN LESS THAN 48 HOURS.

Download the brochure


Ataya & Partners is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick above the box.

Connect with us

Avenue Louise 479/58, 1050 Bruxelles.

  • dummy+32 2 340 32 00

  • dummy admin@atayapartners.com

Search