From the Basics to the Next Generation. We have the Role Based Training for you
Class Duration: 1 Days
Level of Knowledge: Must have a Personal Data Processor and Personal Data Controller Certificates.
Target Audience: Must be assigned the Role in the Business as the Personal Data Officer (PDO) role.
Class Objective: Personal Data Officer is the bridge between the Personal Data Controllers and the Board of Directors/Owner in your organization. Their primary responsibility is to be the Project Manager of the Personal Data Program as well as the Primary Responsible body for determining course of action recommendations to be given to the ACCOUNTABLE BODY of the business which is the Board of Directors or Company Owner as the situation dictates.
Class Duration: 2 Days
Level of Knowledge: None to Limited
Target Audience: All Members of the Business performing PII data management.
Class Objective: UU PDP Law 27 of 2022 greatly changes the controls and processes that must be followed when handling PII data. Your business has a short time to redo the majority of your customer services and employee management procedures. Investments will be needed in staff and technology to protect your team from possible fines or other legal issues going forward.
Class Duration: 2 Days
Level of Knowledge: Must have a Personal Data Processor Certificate.
Target Audience: Must be assigned the Role in the Business as the Personal Data Controller (PDC) or Personal Data Officer (PDO) roles.
Class Objective: UU PDP Law 27 of 2022 greatly changes the controls and processes that must be followed when handling PII data. Your business has assigned you the responsibility of managing your Personal Data Protection policy, procedures and technologies on a day to day basis. This responsibility has administrative and potential criminal compliance requirements that you must meet. This Class is to explain these requirements and how they impact your job as either the PDC or PDO. PDO manages the PDC, the PDC manages the daily PDP operations.
Class Duration: 2 Days
Level of Knowledge: None to Limited
Target Audience: ALL Senior and Middle Management is invited to attend
Class Objective: Get a better understanding of the impact of Cyber Fraud of day to day banking operations. Learn how your teams can better identify cyber fraud and prevent loss of reputation by the bank as well as prevent customer funds lost.
Class Duration: 5 Days
Class Location: Multiple / Including your location
Level of Knowledge: None to Limited (First Class in Series on topic)
Target Audience: ALL Senior to Middle Management and Senior Technical Leads
Class Objective: Cyber Resilience is not a new term, but it may be a new way of looking at your cyber infrastructure and security implementation. We provide an interactive classroom experience to educate persons on the concepts behind cyber resilience and the fundamentals of cybersecurity that are the foundations of cyber resilience.
The WHY cyber resilience is being required and the benefits of implementing the controls at all levels of your organization will be interactively discussed by the class. HOW this differs from current cybersecurity guidance will be explained and examples of implementation procedures will be reviewed with the class. Students will be able to identify a real implementation gain versus a fake security solution or implementation going forward.
POJK 11-03-2022 cybersecurity and cyber resilience requirements are discussed in detail with the class. How your Supply Chain management, Network Architecture and Data Center implementations impact your Security Maturity are reviewed. Questions about how PII / PDP regulations and implementation impacts your cyber resilience will be addressed.
Different scenarios of architecture will be reviewed with a Security Maturity Assessment to allow the class to understand how ratings should be applied. Current industry guidelines for cyber resilience, cyber security and related organizational Continued Professional Education will be discussed. This will allow your staff to better understand how to do your Self Security Management Assessment(s) (SMA). Plus, what improvements will be needed to improve your score.
Students will be able to perform an accurate Self Security Maturity Assessment after the class.
Class Duration: 5 Days
Level of Knowledge: None to Limited (First Class in Series on topic)
Target Audience: ALL Middle Management and Senior Technical Leads
Class Objective: International and NATIONAL Cybersecurity is based on the same principles of execution. BSSN, MoCI, and other Ministries with Indonesia base their recommendations on the NIST Cybersecurity Framework. Based on this foundation we will:
Class Duration: 5 Days
Level of Knowledge: Students needs to have attended the 101 with same title first
Target Audience: IT Management and Senior Technical Leads
Class Objective: This is part 2 of a 4 part class. Identify is the topic based on the Cybersecurity Framework / NIST 800-53r5.
Risk Management, Continuous Monitoring, Security Validation, Supply Chain Controls, Asset and User Management what do all of these have in common. These are the building blocks of Identify and as such the foundation of Cybersecurity Operations, DEV/SEC/OPS and your organization’s Policies and Procedures going forward.
Understanding these relationships and how to effectively manage these areas in a cost effective manner is the students primary goal. Reducing waste in contracting and purchasing properly defined services like Pen Testing based on the formal standards will help your organization increase PROFIT while reducing costs.
Class Duration: 5 Days
Level of Knowledge: Students needs to have attended the 101 with same title first
Target Audience: IT Management and Senior Technical Leads
Class Objective:
This is part 3 of a 4 part class. Protect and Detect are the topics based on the Cybersecurity Framework / NIST 800-53r5.
Protect – Your staff will learn best practices for how to REALLY protect your business from Local and International Threats. Current and up to cyber threats are discussed and each class is unique for this reason. The process of how to be compliant with MoCI 20-2016 and other Data Protection requirements based on Industry Specific from Indonesia Ministries such as Health Care and Finance.
Detect – Students learn about the threats to your business and how to see them as they enter your environment. Identify the protections you need to isolate and block attacks either via automation or human interaction in a timely manner (5 minutes or less). Students will better understand current DEV/SEC/OPS requirements and understand the principles of current ATT&CK / D3FEND as applied to their environment.
Class Duration: 5 Days
Level of Knowledge: Students needs to have attended the 101 with same title first
Target Audience: Corporate Planning Staff, IT Management and Senior Technical Leads
Class Objective:
This is part 4 of a 4 part class. Response and Recover are the topics based on the Cybersecurity Framework / NIST 800-53r5.
Response – How your business reacts to a breach or security event will define your business in both the public eye and in the future profit of the business. The ability to correctly react is something that MUST BE preplanned and updated on a regular basis. Practice, Practice, Practice. The process of how to create and maintain these plans will be provided to the class and practiced during the week.
Recover – We plan for the worst case and hope for the best. The recovery of a business is the most important step in your reaction to any cyber, breach or disaster event. Implementation of your recovery plans and the continual improvement of your plans should be a part of your active planning roadmap. Students will look at the life cycle of Response and Recover
Email us at contactus@nagacybersecurity.com