Loading Events

« All Events

  • This event has passed.

Cyber Security

December 1, 2025 @ 9:00 am - December 5, 2025 @ 3:30 pm UTC+0
Corporate Planning

Strategy to Combat Cybercrime & Information Breach – Cyber Security course

Course overview

Cybercrime and information security has become an issue that affects each and every person in the global world today. The security of information determines the extent to which organizations can realize their goals and objectives. The field of  cybercrime and information security is very critical in all spheres and hence the need to be dynamic and be continuously updated on information security management. Security is diverse and includes technical, managerial, legal and social imperatives. In order to safeguard organizational and national assets, interests and financial resources it is prudent that institutions look at contemporary ways of guaranteeing the security of information.

The growing number of Cyber security threats combined with the increasing complexity of threats (such as the recently Wannacrypt ransomware) have finally caught the attention of organization leaders. Information security is not only the responsibility of the IT department but requires the oversight & participation of top management, and a proactive participation of users.

All organizations are vulnerable to Cyber Security, data breach and ransomware; the question is when? According to IBM and Ponemon Institute report the average cost/loss per compromised record is 1548 Rands and the average total cost for 19 South African companies that participated in their study was 28.6million Rands in 2016 They found out the biggest consequences of a data breach to an organisation is lost business. It translates to financial and reputation risk; consequently, affects the competitive advantage of an organisation.

This course in cybercrime will assist delegates on how to protect their organizations information by building and implementing a comprehensive security strategy and roadmap. The course is aligned to ISO 27001, Protection of Personal Information (POPI) act and General Data Protection Regulation (GDPR).

Specific Program Objectives:
  • To introduce the participant to different approaches to Cyber security analysis
  • Provide an understanding of computer systems security policies, roles, responsibilities, practices, procedures, and
  • Understand the value of good security practices
  • Understand the capabilities and performance of your organization’s current security practices
  • Understand your security obligations, scope, boundaries, and responsibilities
  • Establish a security target state based on your organizational context
  • Develop a strategy and roadmap to help you achieve your security target state
  • Implement your security strategy and roadmap by providing best practices and templates
  • Introduce to some frameworks that align to POPI & GDPR

Organizer

  • ITC
  • Phone +27677572159
  • Email admin@internationaltrainersconsultants.com

Leave a Reply

Your email address will not be published. Required fields are marked *