Loading Events

All Events

  • This event has passed.

Fundamentals of Cyber Security

August 28, 2021 @ 4:00 pm - 7:00 pm

This Module is 3 hours workshop with interactive Q&A at the end. Wellington Professionals will attend physically in Brooklyn, Wellington. Rest of the participants through remote video link

Please get yourself registered by sending the following details to Tech_stream@charitynz.org

Your name

Phone number

Address

Profession

 

This will cover below topics

Workshop contents

1. Cyber Security Concepts
  • Cyber Security Concepts and Definitions
    – Difference between IT Security, Information Security, and Cyber Security
    – Assets, Threats & Vulnerabilities
    – Likelihood, Consequence, and Impact
    – Inherent Risk, Current Risk, and Residual Risk
  • Corporate Cyber Security Strategy
    – Supporting Business Goals and Objectives
    – Cyber Security Policy and Framework
    – Cyber Awareness, Training and Education
  • Laws, Regulations and Industry Standards
  • Roles and Responsibilities
  • Professional Organisations and Ethics
  • Q&A

Exercise – Development of a cyber asset register

2. Security Architecture
  • Security Architecture Concepts and Definitions
  • Security Architecture Frameworks
    – SABSA
    – TOGAF
  • – PCI & ISO27K
  • Security Architecture Design Principles
  • Service Models
    – Insourcing
    – Outsourcing
    – Managed Services – Single provider, multiple providers, prime provider
    – Cloud Services – Cloud service models and cloud deployment models
  • Q&A

Exercise – Recommendations for service provider models in addressing risks
Exercise – Identification of security architecture design principles

3. Implementing Security
  • OSI and TCP/IP and Internet Models
  • Low and high communication protocols/ports
  • Network Fundamentals
    – Network Security
    – Network Topologies
    – Security Zones
    – Network Security Technologies
    – Virtualisation Benefits and Security Challenges
  • Virtualization and VLAN segmentation
  • Endpoint Security
    – Servers, desktops, laptops, tablets, mobile devices, wearables
    – Endpoint Security Technologies
    – Specialised Endpoint Systems
  • Next Generation of Endpoint with EUBA
  • Application Security
    – Software Development Lifecycle
    – OWASP Top 10
    – Web Application Firewall and Database Firewall
  • Data Security
    – Data owners, data classification, labeling
    – Access control
    – Data governance and lifecycle
    – Data remanence
  • Australian Signals Directorate Top 35, E4 and E8
    – SANS Top 20 mapped to ASD Top 35 and other frameworks
  • 20 CIS controls of Centre for Internet Security
  • Q&A
  • Exercise – Establish a data classification scheme
    Exercise – Design a secure network topology with network security zones, overlay the data classification scheme and placement of recommended perimeter and layered controls
4. Cryptography
  • Cryptography Key Terms and Concepts
  • Symmetric Algorithms
    – Data Encryption Standard (DES)
    – Triple DES
    – Advanced Encryption Standard (AES)
    – Other symmetric algorithms
  • Diffie Helman groups and PFS
  • Asymmetric Algorithms
  • Hashing Algorithms
  • Non-Repudiation
  • Cryptographic Attacks
    – Side-channel
    – Birthday
    – Implementation
    – Other attack methods
  • Implementing Cryptography in the Real World
    – Public Key Infrastructure (PKI)
    – Electronic Document Exchange
    – Virtual Private Networks (VPNs)
    – Secure e-mail
    – Steganography
    – Digital Watermarks
    – Wireless Security
    – Secure Shell
    – Key Management
  • Q&A
5. Risk Management
  • Risk Management Concepts and Definitions
    – The stages of risk
    – Systemic and systematic Risk, Risk Aggregation
    – Risk treatment options Risk Acceptance, Reduction, Transfer and Avoidance
    – Risk Appetite and Tolerance
    – What is GRC (Governance, Risk Management, and Compliance)
    – Risk Management Process
    – Quantitative, Semi-quantitative, and Qualitative Risk
    – Introduction to Critical Security Controls CIS20” under the first few lines of Risk Management Concepts and Definition,
  • Threats and Opportunities
    – Assessing the current threat landscape
    – Developing a threat taxonomy
    – Advanced Persistent Threats (APT)
    – Bring Your Own Device or Technologies
    – The Internet of Things
  • Block chain is a way to save IOT
  • Controls, Countermeasures, and Enablers
  • Business Impact Analysis
    – Sample Business Impact Analysis Template
    – Sample Business Impact Levels
  • Q&A
  • Exercise – Development of a threat taxonomy and identification of vulnerabilities
    Exercise – Evaluate inherent risk, current controls, current risk, recommend controls and residual risk
6. Business Continuity and Disaster Recovery Planning
  • Business Continuity Planning
    – NIST SP800-34 as a framework
  • Disaster Recovery Planning
    – Relationship between the BCP and DRP
    – Events that trigger a BCP/DRP
  • Developing the BCP and DRP
    – Application of NIST SP800-34
    – Initiation
    – Business Impact Analysis – BIA
    – Identification of preventive controls
    – Recovery strategies
    – Plan design and development and important BCP/DRP frameworks
    – Ongoing maintenance
  • Q&A

Exercise – Identify and rank the most important business operations

7. Incident Response
  • NIST Cyber Security Framework
    – Identify
    – Protect
    – Detect
    – Respond
    – Recover
    • Cyber Forensics
      – General phases of the forensic process
      – Anti-forensics
      – Forensic media analysis
      – Network forensics
      – Forensic analysis of software, Embedded devices, and Electronic Discovery
    • Incident Response Management
      – Security events and Security incidents
      – Incident Response Methodology using NIST SP800-61
    • Security Assurance
      – Defining and implementing meaningful metrics
      – Configuration management
      – Minimum Security Baselines
      – Vulnerability Assessments
      – Penetration Testing
      – Security Audits (Internal & External Audits)
      – Security Assessments and their types
      – Log reviews, retention, centralization, and analysis
      – Security Information and Event Management System (SIEM)
    • Next-Gen of SIEM and Security Orchestration and Automated Response (SOAR)
    • Q&A

Details

Date: August 28, 2021
Time:
4:00 pm - 7:00 pm

Venue