Sei sulla pagina 1di 3

THE INSTITUTE OF CHARTERED ACCOUNTANTS OF BANGLADESH (ICAB)

Schedule of Training on Cybersecurity, Enterprise Information Risk


Management, and Regulatory Compliance
Organized by
ICAB Center for Professional Excellence (ICPE)
Date & Time: 19 September 2017 to 12 October 2017 at 6:00 p.m. to 9:00 p.m.
Venue: ICAB Center for Professional Excellence (7th floor)

Session Time
Topics Resource Persons
Day/Date Start End
Confidentiality, Integrity, and Availability (CIA);
Cyberspace, Internal & External Cyber Threat,
Vulnerability, Cyber Bullying, Hacker, Malware,
Virus, Worm, Trojan Horse, Logic Bomb, Anti-
Virus Software, Spam, Phishing, Spear Phishing,
Pretexing, Piggyback, Baiting, Spoofing, Tailgating,
6:00pm 8:00pm
Shoulder Surfing, Keyboard Logger, Dumpster
Diving, Sinkhole, Blackhole, Eavesdropping,
Ransomware, Spyware, Brute Force, Dictionary
Attack, Industrial Espionase, Botnet & Zombie,
Rootkit, Backdoor, Man-in-the-Middle, and
Underground Hacker Market.
Day-1
8:00pm 8:15pm Prayer & Tea Break Dr. Em Pannah
19 Sept 2017
(Tuesday) Confidentiality, Integrity, and Availability (CIA);
Cyberspace, Internal & External Cyber Threat,
Vulnerability, Cyber Bullying, Hacker, Malware,
Virus, Worm, Trojan Horse, Logic Bomb, Anti-
Virus Software, Spam, Phishing, Spear Phishing,
Pretexing, Piggyback, Baiting, Spoofing, Tailgating,
8:15pm 9:00pm
Shoulder Surfing, Keyboard Logger, Dumpster
Diving, Sinkhole, Blackhole, Eavesdropping,
Ransomware, Spyware, Brute Force, Dictionary
Attack, Industrial Espionase, Botnet & Zombie,
Rootkit, Backdoor, Man-in-the-Middle, and
Underground Hacker Market.
Least Functionality, Least Privilege, Hardening,
Social Engineering,Firewall, Demilitarized Zone
(DMZ), Cyber Breach, Cyber Attack, Zero-Day
6:00pm 8:00pm
Attack, DoS, and DDoS.
Cyber Weaponry, Cyber Crimes, and Cyber
Day-2 Warfare.
21 Sept 2017 8:00pm 8:15pm Prayer & Tea Break Dr. Em Pannah
(Thursday)
Least Functionality, Least Privilege, Hardening,
Social Engineering,Firewall, Demilitarized Zone
(DMZ), Cyber Breach, Cyber Attack, Zero-Day
8:15pm 9:00pm Attack, DoS, and DDoS.
Cyber Weaponry, Cyber Crimes, and Cyber
Warfare.

PC/Nizam Page 1 of 3
Session Time
Topics Resource Persons
Day/Date Start End
Enterprise Information Risk Management
(EIRM)Regulatory Requirements - Acts, Executive
Orders, Circulars, Memorandums, Standards,
6:00pm 8:00pm
Rules, Regulations, Policies, Procedures,
Guidelines, Common Laws, Industry Best Practices,
etc.
Day-3
8:00pm 8:15pm Prayer & Tea Break Dr. Em Pannah
26 Sept 2017
(Tuesday) Enterprise Information Risk Management
(EIRM)Regulatory Requirements - Acts, Executive
Orders, Circulars, Memorandums, Standards,
8:15pm 9:00pm
Rules, Regulations, Policies, Procedures,
Guidelines, Common Laws, Industry Best Practices,
etc.
Digital Asset; Critical Infrastructure Protection
(CIP), Identity & Access Management (IAM), Rules
6:00pm 8:00pm of Behavior (ROB), etc.
Awareness; Basic, Refresher, and Role Based
Training, etc.
Day-4
28 Sept 2017 8:00pm 8:15pm Prayer & Tea Break Dr. Em Pannah
(Thursday)
Digital Asset; Critical Infrastructure Protection
(CIP), Identity & Access Management (IAM), Rules
8:15pm 9:00pm of Behavior (ROB), etc.
Awareness; Basic, Refresher, and Role Based
Training, etc.
Personally Identifiable Information (PII),
Protected Healthcare Information (PHI), Data
Breach, Digital Privacy, Identity Theft Prevention,
6:00pm 8:00pm Privacy Impact Assessment (PIA), Child
Pornography & Exploitation, Loss Expectancy,
Understanding & Developing Risk Profile, Residual
Risk, Business Impact Assessment (BIA), etc.
Day-5
3 October 2017 8:00pm 8:15pm Prayer & Tea Break Dr. Em Pannah
(Tuesday)
Personally Identifiable Information (PII),
Protected Healthcare Information (PHI), Data
Breach, Digital Privacy, Identity Theft Prevention,
8:15pm 9:00pm Privacy Impact Assessment (PIA), Child
Pornography & Exploitation, Loss Expectancy,
Understanding & Developing Risk Profile, Residual
Risk, Business Impact Assessment (BIA), etc.
Security Documentation Highlights (Privacy
Threshold Analysis [PTA], Contingency Plan [CP],
Contingency Test Plan, Configuration
Day-6 6:00pm 8:00pm Management Plan [CMP], Incident Response Plan Dr. Em Pannah
5 October 2017 [IRP], Risk Management Plan [RMP], System
(Thursday) Security Plan [SSP], etc.).

8:00pm 8:15pm Prayer & Tea Break


Information Technology (IT) Risk Management
PC/Nizam Page 2 of 3
Framework (RMF); Selecting & Implementing
Information Technology (IT) Security Controls; Risk
Mitigation, Risk Avoidance, Risk Acceptance, Risk
Session Time
Topics Resource Persons
Day/Date Start End
Security Documentation Highlights (Privacy
Threshold Analysis [PTA], Contingency Plan [CP],
Contingency Test Plan, Configuration
8:15pm 9:00pm Management Plan [CMP], Incident Response Plan
[IRP], Risk Management Plan [RMP], System
Security Plan [SSP], etc.)

Encryption & Decription, Biometrics, Digital


Forensics, Media Sanitization, Degausing; Security
6:00pm 8:00pm Updates, Patches, Hot fixes, Independent
Verification & Validation (IV&V), Gap Analysis,
Day-7
Plan of Action & Milestones (POA&M),etc.
10 October 2017 8:00pm 8:15pm Prayer & TeaBreak Dr. Em Pannah
(Tuesday)
Encryption & Decription, Biometrics, Digital
Forensics, Media Sanitization, Degausing; Security
8:15pm 9:00pm Updates, Patches, Hot fixes, Independent
Verification & Validation (IV&V), Gap Analysis,
Plan of Action & Milestones (POA&M),etc.
Defense-in-Depth & Defense-in-Breadth to
Minimize Operational Risk; Incident Response;
Disaster Recovery; Continuity of Operation;
6:00pm 8:00pm Business Impact Assessment (BIA), and Regulatory Dr. Em Pannah
Compliance, etc.
Day-8
12 October 2017 Final Exam
(Thursday) 8:00pm 8:15pm Prayer & TeaBreak

President/Vice
8:15pm 9:00pm Closing & Certificate Awarding Ceremony President (E &T) -
ICAB

PC/Nizam Page 3 of 3

Potrebbero piacerti anche