Where is your organization on the Cyber Security Maturity Model

Duration

60  Mins

Level

Basic & Intermediate & Advanced

Webinar ID

IQW19I0969

  • Core concepts of Maturity Models
  • Different Models
  • Maturity Indicator Levels
  • Using the Models

Overview of the webinar

Is your organization prepared if your business is targeted and your Business Operations are impacted? Where is your organization on the Cyber Security Maturity Model? The Maturity Model provides a path forward and enables your organization to periodically assess where it is along that path. 

We will cover different Cyber Security Maturity Models such as FFIEC and DOD’s /Carnegie Mellon.

A Cyber Security maturity model provides a benchmark against which an organization can evaluate the current level of capability of its practices, processes, and methods and set goals and priorities for improvement.

Cybersecurity practices in the model enable organizations to protect and sustain assets in a manner that aligns with their importance in supporting IT service delivery and organization missions

Who should attend?

This is for all Decision makers (executives) who control the allocation of resources and the management of cybersecurity risk associated with enterprises IT services; these are typically senior leaders

  • Leaders with responsibility for managing organizational resources and operations associated with the domains of this model as they relate to enterprise IT services
  • IT and Cyber Practitioners with responsibility for supporting the organization in planning and managing changes in the organization 
  •  Information Security Managers
  •  CEO, CIO, CFO,  CSO
  •  Technology Managers
  •  Auditors

Why should you attend?

Understanding where your organization is on the Cyber Security Maturity Model can help your organization identify areas of weakness and strengths. Knowing where you are in maturity helps IT service delivery organizations of all sectors, types, and sizes evaluate and make improvements to their cybersecurity programs.

Some of the great outcomes of knowing where you stand on the model and understating the model are :

  • strengthen enterprise cybersecurity capabilities
  • enable IT service organizations to effectively and consistently evaluate and benchmark cybersecurity capabilities
  • share knowledge, best practices, and relevant references across IT service organizations as a means to improve cybersecurity capabilities
  • enable IT service organizations to prioritize actions and investments to improve cybersecurity
  • enable IT service organizations to communicate capability levels in meaningful terms

 

Faculty - Dr.Michael C. Redmond

Dr. Michael C. Redmond is a globally recognized expert in Enterprise Risk Management, Governance, Risk and Compliance

With extensive experience advising board members, CISO’s, CEOs, and others for Private and Public Organization, , Dr. Redmond brings a wealth of knowledge and practical insights. She has been a lecturer, trainer, consultant and auditor for 20 years. She is a published author and her books are sold in over 35 countries, Mastering Business Continuity Management, Mastering Your Introduction to Cyber Security, Evolving Roles of Chief Information Security Officer’s and Chief Risk Officers, Mastering Your Work Life Balance. She has over 30 certifications including International Standards.

100% MONEY BACK GUARANTEED

Refund / Cancellation policy
For group or any booking support, contact: