Meet the experts, get the knowledge, succeed the examination: This will happen in 9 weeks starting soon.

9
Running on Monday in Q4 2020 in Virtual workshop sessions
800+
Join other graduates from Solvay Executive Education in Digital Governance and Trust and build your high-performance network
100+
The education is moderated by a topic leader and sessions are lectured by subject matter experts
INTRODUCING
THE SOLVAY BRUSSELS SCHOOL
benefits obtained from this module
Running since 2015 within the Information Security Management courses at Solvay Brussels School, by attending this module you will be able to :
- Access the fundamentals of Cybersecurity
- Understanding of the NIST Cybersecurity framework
- Be lectured by Senior experts and you will grasp their hands-on knowledge
- Prepare Cybersecurity Nexus Fundamentals Certification from ISACA
Upon success at the examination session, you will get a certificate of success delivered by Solvay Executive Education in Digital Governance and Trust.
key objectives

- Master the use of relevant bodies of knowledge such as best practices and latest defense frameworks in cybersecurity.
- Become familiar with the latest attack patterns and counter-measures including predictive analytics and machine learning as preventive and detective tools.
- Gain hands-on experience with Cybersecurity Core Functions (NIST and CSF).
- Acquire robust knowledge towards implementing an end-to-end cybersecurity defense model at participant's company.
- Apply company-specific cybersecurity governance to ensure decision and control bodies are in place.
Agenda of the course

Session 1 - 28 Sept 2020 : Wim Bartsoen
First Core Function: Identify
- A Call to arms: Stop The FUD
- A few Cases... and Lessons
- The Amazons of Crime
- Zooming Out: Sun Tzu’s persistent relevance
- The Internal Drivers of exposure to Cyber Threats
- Takeaways for A Cyber Security Strategy

Track I - 30 Sept 2020
First Core Function: Identify
- A Call to arms: Stop The FUD
- A few Cases... and Lessons
- The Amazons of Crime
- Zooming Out: Sun Tzu’s persistent relevance
- The Internal Drivers of exposure to Cyber Threats
- Takeaways for A Cyber Security Strategy


Session 2 - 05 Oct 2020: Karine Goris

First Core Function: Identify (2)
- Know your business
- Know your people, processes and technology
- Information security management process
- Information security strategy & roadmap

Track II - 7 Oct 2020
First Core Function: Identify (2)
- Know you business
- Know your people, processes and technology
- Information security management process
- Information security strategy & roadmap

Session 3 - 12 Oct 2020: Marc Vael
Second Core Function: Protect (1)
- NIST - National Institute of standards and Technology
- Second Core Function: Protect (details).
- Examples of outcome Categories within this Function
- Adaptive security

Track III - 14 Oct 2020
Second Core Function: Protect (1)
- NIST - National Institute of standards and Technology
- Second Core Function: Protect (details).
- Examples of outcome Categories within this Function
- Adaptive security


Track IV - 21 Oct 2020
Second Core Function: Protecct (2)
- Cyber Resilience : A definition
- Cyber Resilience Second Core Function: Protect
- Technology
- Network
- System
- Application
- Other Domains
- Processes and People
- Technology

Session 4 - 19 Oct 2020: Umut Inetas
Second Core Function: Protect (2)
- Cyber Resilience : A definition
- Cyber Resilience Second Core Function: Protect
- Technology
- Network
- System
- Application
- Other Domains
- Processes and People
- Technology
Session 5 - 26 Oct 2020: Umut Inetas
Second Core Function: Detect
- Stats & Subject Introduction
- Terminology
- Current technologies and their paradigms
- Systems variables for detection
- The good, the bad and the ugly
- The future
- Your turn - Q&A

Track V - 04 Nov 2020
Second Core Function: Protect (1)
- NIST - National Institute of standards and Technology
- Second Core Function: Protect (details).
- Examples of outcome Categories within this Function
- Adaptive security


Session 6 - 09 Nov 2020: Ignace Caria

Fourth Core Function: Respond
- Incident Response Management Frameworks
- Prepare your response
- Detect the cyber threats
- Action to take
- Communication
- Emerging Threats require change of approach

Track VI - 18 Nov 2020
Fourth Core Function: Respond
- Incident Response Management Frameworks
- Prepare your response
- Detect the cyber threats
- Action to take
- Communication
- Emerging Threats require change of approach
Track VII - 25 Nov 2020
Fifth Core Function: Recover (1)
- Are you ready?
- Introduction
- Planning
- Continuous improvements
- Metrics
- Building the playbook


Session 7 - 16 Nov 2020: Stijn Meeuws
Fifth Core Function: Recover (1)
- Are you ready?
- Introduction
- Planning
- Continuous improvements
- Metrics
- Building the playbook


Session 8 - 23 Nov 2020: Umut Inetas

Awareness + pre test
- Why awareness?
- Stakeholder management
- Behaviour change and communication
- Know your channels
- Reference board and roadmap
- Approval roadmap and budget

Track VIII - 2 Dec 2020
Awareness + pre test
- Why awareness?
- Stakeholder management
- Behaviour change and communication
- Know your channels
- Reference board and roadmap
- Approval roadmap and budget
Lecturers







Who should attend
- Information technology professionals wishing to acquire Cybersecurity fundamentals
- Information Security experts wishing to obtain a 360° view on Cybersecurity at a practical management workshop
- Those wishing to master NIST Cybersecurity framework
- Those wishing to succeed the CSX Fundamentals examination from ISACA® (link to https://www.isaca.org/credentialing/cybersecurity)
Practicalities
English
18:15 to 21:30
Each Monday starting on 28 Sept
Both on site and virtual
Why solvay brussels school executive education
- Join one of the most renowned Business School in Belgium.
- Receive a Solvay Brussels School certificate at the end of the module if you pass the exam.
- We offer the full experience to our trainees: pre-readings, interactive classes, printed training material and more.
- All of our trainers are highly experimented, and the trainings are given in limited groups to ensure a tailored course.
- This education is part of Solvay Executive Education dedicated to Digital Governance and Trust.
- Upon succeeding the examination, participants receive a certification of success from Solvay Executive Education.
- Professor Georges Ataya is the founder and the academic Director of this education programme.
- https://exed.solvay.edu/en/13-gamme/10-digital-governance-trust
Ataya & Partners involvement
- Consulting opportunities after taking our trainings.
- Recruitment opportunities with Hightech Partners, our sister company specialised in executive recruitment.
- Tailored coaching based on our new Cybersecurity skill assessment. We will help you to choose best training to improve your skills.
- Join our community and benefit from a large cybersecurity network, interesting articles, discount on our training and many other advantages.
WHAT GRADUATES SAY ABOUT THIS WORKSHOP



The aim of the S3 module is to be as close to reality as possible. As a matter of fact, collaboration between stakeholders is key when it comes to handling cybersecurity. Participants are expected to show the same level of collaboration in the workshops

NEED HELP OR HAVE QUESTIONS?

Simona Boldrini
sb@atayapartners.com
- DOWNLOAD THE BROCHURE NOW
- LEAVE YOUR BEST EMAIL AND TELEPHONE NUMBER
- YOU WILL BE CONTACTED BY OUR COURSE MANAGER IN LESS THAN 48 HOURS.