Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
C-SCRM
Fundamentals of Cybersecurity Supply Chain Risk Management
Ohio TechCred Approved Credential: Supply Chain Management
Description
Fundamentals of Cybersecurity Supply Chain Risk Management Introduction
Welcome to the Fundamentals Of Cybersecurity Supply Chain Risk Management course, your gateway to mastering C-SCRM from the ground up.
Fundamentals of Cybersecurity Supply Chain Risk Management Course Objectives
- Understand the Fundamentals: Grasp basic to advanced concepts of Cybersecurity Supply Chain Risk Management.
- Explore Frameworks and Models: Learn to navigate and apply the NIST SP 800-161R1 framework for C-SCRM.
- Integration Techniques: Master the integration of C-SCRM practices into broader enterprise risk management strategies.
- Risk Assessment and Management: Identify, analyze, and manage risks associated with supply chains to enhance security.
- Implement Security Controls: Develop skills to implement robust security measures within the supply chain.
- Practical Application: Gain practical experience in creating and maintaining a resilient C-SCRM program.
Prerequisites
- This course welcomes individuals with basic computer knowledge and a genuine interest in advancing C-SCRM within their organizations.
Audience
This course is designed for:
- Risk professionals
- Security professionals
- Technology professionals involved in supply chain management
- Individuals responsible for or interested in C-SCRM (Please note that this is not a general IT security course)
Fundamentals of Cybersecurity Supply Chain Risk Management Outline
Course Introduction
- Course overview and materials
The Basics of Cybersecurity Supply Chain Risk Management
- Understanding C-SCRM
- Differentiating ICT, IT, OT, and Enterprise
- Dimensions of SCRM
- Describing Enterprise Supply Chains
- Internal C-SCRM Stakeholders
An Overview of NIST SP 800-161R1
- Name and Purpose
- Relationship to Other NIST Publications
- Design of the Publication
Integration of C-SCRM into Enterprise Risk Management
- Enterprise Risk Management Process
- Business Case for C-SCRM
- Cybersecurity Risks Across Supply Chains
- Multilevel Risk Management
- C-SCRM Program Management Office (PMO)
Critical Success Factors in C-SCRM
- C-SCRM in Acquisition
- Supply Chain Information Sharing
- C-SCRM Training and Awareness
- C-SCRM Key Practices
- Capability Implementation Measurement and C-SCRM Measures
- Dedicated Resources
C-SCRM Security Controls
- Introduction and Background
- Controls Design
- C-SCRM Controls Across the Enterprise
- Selecting, Tailoring, And Implementing C-SCRM Security Controls
- C-SCRM Control Family Summaries
The Risk Exposure Framework
- Threat Scenario Description and Use Cases
- Risk Exposure Framework
- Risk Exposure Framework Scenarios
A Primer on Creating a C-SCRM Program
- C-SCRM Strategy and Implementation Plan
- C-SCRM Policy
- C-SCRM Plan
- Cybersecurity Supply Chain Risk Assessment Template
|
$1595.00
|
2 Days Course |

