Where is your organization on the Cyber Security Maturity Model

Duration

60  Mins

Level

Basic & Intermediate & Advanced

Webinar ID

IQW19I0969

  • Core concepts of Maturity Models
  • Different Models
  • Maturity Indicator Levels
  • Using the Models

Overview of the webinar

Is your organization prepared if your business is targeted and your Business Operations are impacted? Where is your organization on the Cyber Security Maturity Model? The Maturity Model provides a path forward and enables your organization to periodically assess where it is along that path. 

We will cover different Cyber Security Maturity Models such as FFIEC and DOD’s /Carnegie Mellon.

A Cyber Security maturity model provides a benchmark against which an organization can evaluate the current level of capability of its practices, processes, and methods and set goals and priorities for improvement.

Cybersecurity practices in the model enable organizations to protect and sustain assets in a manner that aligns with their importance in supporting IT service delivery and organization missions

Who should attend?

This is for all Decision makers (executives) who control the allocation of resources and the management of cybersecurity risk associated with enterprises IT services; these are typically senior leaders

  • Leaders with responsibility for managing organizational resources and operations associated with the domains of this model as they relate to enterprise IT services
  • IT and Cyber Practitioners with responsibility for supporting the organization in planning and managing changes in the organization 
  •  Information Security Managers
  •  CEO, CIO, CFO,  CSO
  •  Technology Managers
  •  Auditors

Why should you attend?

Understanding where your organization is on the Cyber Security Maturity Model can help your organization identify areas of weakness and strengths. Knowing where you are in maturity helps IT service delivery organizations of all sectors, types, and sizes evaluate and make improvements to their cybersecurity programs.

Some of the great outcomes of knowing where you stand on the model and understating the model are :

  • strengthen enterprise cybersecurity capabilities
  • enable IT service organizations to effectively and consistently evaluate and benchmark cybersecurity capabilities
  • share knowledge, best practices, and relevant references across IT service organizations as a means to improve cybersecurity capabilities
  • enable IT service organizations to prioritize actions and investments to improve cybersecurity
  • enable IT service organizations to communicate capability levels in meaningful terms

 

Faculty - Dr.Michael C. Redmond

Ms. Michael C. Redmond specializes in Business Continuity Management, Emergency Management, Crisis Management, Information Security, Business Processes Reorganization, Management Processing, and Regulatory Compliance. Regulatory Compliance includes: FFIEC, Sarbanes Oxley, Patriot, HIPPA, UCC, Basal Accord, and NFPA 1600, NYSE's version, known as Rule 446, and the NASD's Rules 3510 and 3520 and others. She is the CEO of Redmond Worldwide “Enterprise Solutions That Work”sm.
Ms. Redmond has extensive knowledge in Enterprise Risk Management. She has experience in developing and implementing systematic availability programs, post-event operations, and streamlining operations through availability and contingency planning. Ms. Redmond has done many performed as an Internal Auditor in a consulting capacity for many firms Enterprise Risk Programs. She has done Business Continuity/Disaster Recovery Projects for many Universities, Corporations, Government Agencies and the US Military. Ms. Redmond has experience with various applications including, Banking Systems, Financial Applications, Accounting Systems, Payments, Payroll, and Pensions as well as Network Recovery, Telecom Recovery and other areas of technology. Ms. Redmond has prepared Business Continuity Plans for such Data Centers with such technologies as mainframes, local area networks, systems and application software, and telecommunications systems. She has been involved with retrofitting and reconfiguring Data Centers to serve as Hot Sites. She has conducted both Physical Security and Building reviews for facilities. She has consulted for entities in the area of availability planning, specifically relating to End-to-End, Content and Architecture. Ms. Redmond has consulted for a variety of industries including: Financial Institutions, Trading Operations, Manufacturing, Utilities, Educational Facilities, Government Agencies and the Military.

100% MONEY BACK GUARANTEED

Refund / Cancellation policy
For group or any booking support, contact: