How to protect your facility from cyberattacks
April 7, 2021
WATERLOO, Ont. – Public and private sector organizations in Canada and around the world are under increasing pressure to protect sensitive information and critical infrastructure from cyber attacks. Threats to information system assets come from state actors, organized crime and hacktivists who now routinely attack our electoral, financial, healthcare and public utility systems.
The purpose of this online program is to provide practical cyber cybersecurity management strategies and recommendations to help minimize the occurrence or impact of cyber-related losses. Our focus is on risk management – identification, management and mitigation of risks – and how to use the various tools and resources to build awareness and cyber resilience.
This program is based on the National Institute of Standards and Technology (NIST) Cybersecurity framework (CSF).
This program is for non-technical senior staff who need a general understanding of cybersecurity practices to protect critical information assets and who need to work with their organization’s IT and cybersecurity experts.
Upon completion you will be awarded a McMaster University – NIHI Certificate of Attendance in Cybersecurity Management. A certificate of attendance is a non-academic certificate acknowledging that the recipient has completed a minimum of 10 hours of education/training in the subject area.
13 Sessions, 13 Hours
3 Live Online & 10 Recorded
Live Online Sessions: Mondays, May 3, 17 & 31, 2021
Each Recording is approximately 1 hour
Recordings One to Five will be available beginning May 4
Recordings Six to Ten will be available beginning May 18
Live Online Sessions:
Mondays May 3, 17 & 31, 2021
12:00 – 1:00 PM ET
All sessions occur online via Webex
CLICK HERE TO REGISTER
Patrick Lo (pictured on left), CEO, Privacy Horizon Inc.
Brendan Seaton (pictured on right), Founder & Chief Creative Officer, Privacy Horizon Inc.; Past President, ITAC Health
- Introduction to cybersecurity
- Cybersecurity management program
- Cybersecurity risk management
- Asset management
- Threat assessment
- Technical and physical safeguards
- Administrative safeguards
- Monitoring and audit
- Cybersecurity incident management
- Cybersecurity recovery planning