Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
C-SCRM
Fundamentals of Cybersecurity Supply Chain Risk Management
Alert MeDescription
Fundamentals of Cybersecurity Supply Chain Risk Management Introduction
Welcome to the Fundamentals Of Cybersecurity Supply Chain Risk Management course, your gateway to mastering C-SCRM from the ground up.
Fundamentals of Cybersecurity Supply Chain Risk Management Course Objectives
- Understand the Fundamentals: Grasp basic to advanced concepts of Cybersecurity Supply Chain Risk Management.
- Explore Frameworks and Models: Learn to navigate and apply the NIST SP 800-161R1 framework for C-SCRM.
- Integration Techniques: Master the integration of C-SCRM practices into broader enterprise risk management strategies.
- Risk Assessment and Management: Identify, analyze, and manage risks associated with supply chains to enhance security.
- Implement Security Controls: Develop skills to implement robust security measures within the supply chain.
- Practical Application: Gain practical experience in creating and maintaining a resilient C-SCRM program.
Prerequisites
- This course welcomes individuals with basic computer knowledge and a genuine interest in advancing C-SCRM within their organizations.
Audience
This course is designed for:
- Risk professionals
- Security professionals
- Technology professionals involved in supply chain management
- Individuals responsible for or interested in C-SCRM (Please note that this is not a general IT security course)
Fundamentals of Cybersecurity Supply Chain Risk Management Outline
Course Introduction
- Course overview and materials
The Basics of Cybersecurity Supply Chain Risk Management
- Understanding C-SCRM
- Differentiating ICT, IT, OT, and Enterprise
- Dimensions of SCRM
- Describing Enterprise Supply Chains
- Internal C-SCRM Stakeholders
An Overview of NIST SP 800-161R1
- Name and Purpose
- Relationship to Other NIST Publications
- Design of the Publication
Integration of C-SCRM into Enterprise Risk Management
- Enterprise Risk Management Process
- Business Case for C-SCRM
- Cybersecurity Risks Across Supply Chains
- Multilevel Risk Management
- C-SCRM Program Management Office (PMO)
Critical Success Factors in C-SCRM
- C-SCRM in Acquisition
- Supply Chain Information Sharing
- C-SCRM Training and Awareness
- C-SCRM Key Practices
- Capability Implementation Measurement and C-SCRM Measures
- Dedicated Resources
C-SCRM Security Controls
- Introduction and Background
- Controls Design
- C-SCRM Controls Across the Enterprise
- Selecting, Tailoring, And Implementing C-SCRM Security Controls
- C-SCRM Control Family Summaries
The Risk Exposure Framework
- Threat Scenario Description and Use Cases
- Risk Exposure Framework
- Risk Exposure Framework Scenarios
A Primer on Creating a C-SCRM Program
- C-SCRM Strategy and Implementation Plan
- C-SCRM Policy
- C-SCRM Plan
- Cybersecurity Supply Chain Risk Assessment Template
$1595.00
|
2 Days Course |