Developed for Supply Chain, IT and Cybersecurity Leaders

Awareness Training

image6

Secure Digital Business Operations

  • Digital business strategy
  • Enterprise ICT governance
  • ICT architecture deployment
  • The value of different types of data
  • Threats, vulnerabilities and risks
  • Types of cyber attacks
  • Business impact
  • The role of government agencies
  • Security by design
  • Legal and regulatory compliance
  • Risk management frameworks
  • Information security management system buy out



Advanced Skills Training

image7

Cyber Supply Chain - Risk Mgmt. (CSC-RM)

  • NIST SP 800-161 guidance
  • Integration of CSC-RM  into organization-wide risk management practices
  • CSC-RM goal and objectives
  • Capability development support:
    • Team roles and responsibilities
    • Defined work process
    • Recommended documentation
  • Cyber supply chain threat examples
  • Multi-tiered risk management approach
  • Relevant security controls:
    • 19 Families - 126 controls
  • Security life cycle management


Guidance

image8

CSC-RM Capability Development

  • Management approach:
    • CSC-RM capability audit
    • Gap identification and analysis
    • Remediation plan development
  • Human resources planning:
    • Organization design and staffing 
  • Work tool utilization:
    • ERP system configuration
    • Multi-level supply chain mapping
    • Specialized CSC-RM applications
  • Business process improvement
  • Assuring targeted business outcomes:
    • Performance metrics and reporting