CERTIFIED

CYBER
RISK
OFFICER

ONLINE COURSE

About This Course

8 Weeks
Plus 1 Week Initial Orientation

8-10 Hours Per Week
Self Paced Entirely Online

Online Academy
Delivered Entirely Online

35 CPE / 84 CPD Points
Approved by Various Bodies

Certification
Continual Assessments

Commences June 4th 2020
New Modules Every Thursday

€1,950
Inc vat

The CCRO in 2 Mins

The Cyber Risk Officer course equips students with a comprehensive understanding of cyber risk management. The syllabus assumes a non-technical student and covers a range of topics from identification of cyber risks through to risk management options. The course has been designed to equip students with the knowledge, skills and confidence they require in order to protect the digital assets of their organisation and support the efforts of or lead the implementation of a cyber risk framework. 

About The ICTTF

The ICTTF – International Cyber Threat Task Force was established in 2010 as a not for profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.  We have been committed to fostering collaboration, networking and knowledge sharing for almost ten years now.

Over that decade, we have constantly innovated on how best to achieve our mission. From online community portals, apps, local membership chapters and International events we have strived to work with our thousands of members from around the world.

Our mantra is “It Takes a Network to Defeat a Network” and our primary objective to foster collaboration and networking has been immensely successful, with our events culminating every year with our annual EU Cyber Summit.

The “bad guys” are strong, highly organised and well trained. Knowledge is power and power is strength. The ICTTF was born in Ireland and when launched used the slogan “Ní neart go cur le chéile” which in English translates to “There is no Strength Without Unity”. To be strong we all need knowledge and that is why we have developed this online training academy, so organisations can get their staff cyber strong and unified.

We will continue to work with our cadre of global cyber security, risk and privacy experts to develop the worlds best cyber academy.  Our first offering is our “Certified Cyber Risk Officer” course and is designed as a non-technical syllabus for business leaders.

We Partner With Industry Leaders

The Course Covers

This course brings you on a journey and commences with how to analyse the inherent cyber risk of your organisation. That includes areas such as:

  • Organisational Characteristics
  • Governance Structure
  • Technology Structure and Systems
  • Product / Service Delivery Channels
  • External Cyber Threats
We then gain an understanding of the current cyber risk status of the organisation holistically by exploring key control areas such as:
 
  • Cyber Risk Management and Oversight
  • Cyber Incident Management and Resilience
  • Cybersecurity Controls
  • Threat Intelligence and Collaboration
  • External Dependency – Vendor / Partner Risk

There is a focus on CRQ (Cyber Risk Quantification), meangingful metrics and how to support and develop a cyber strategy that supports your ERM (Enterprise Risk Management) program and business strategy.  Security standards, legal and compliance requirements are addressed throughout the material.  By the end of the course you will have gained the appropriate knowledge to build, implement or support a risk management framework for your organisation. 

The Course is For

The course syllabus has been specifically designed to be collaborative and bring together business leaders of various disciplines within an organisation. They are the key stakeholders in designing, implementing or supporting the cyber risk management program of an organisation. Key cyber risk management stakeholders include:

  • C-Suite
  • CISO/CSO/CIO or CRO
  • Head of IT/Security
  • CCO Chief Compliance Officer
  • Cyber Security/Risk/Compliance Teams
  • Legal
  • Procurement
  • Head of Business Units
  • Technology Leaders / Project Managers
  • Management Professionals / Team Leaders
  • Digital Consultants

IDEAL TRAINING COURSE FOR

Cyber Risk Leader
Develop and Implement Strategy

Cyber Security and Risk Teams
Collaborate and Support Enterprise

Gaining Recognition
Cyber Risk Management Specialist

HOW DO YOU LEARN

CYBER RISK ACADEMY – ONLINE CAMPUS PORTAL

The course is delivered over 8 weeks and preceded with an orientation module. Every Thursday a new module is added to the course. During the orientation module you will be introduced to your online teaching and technical support network and gain an understanding of the interface and tools. During the orientation phase you complete your student profile and gain an understanding of key milestones and how your assessments are calculated.  Training material comprises of rich interactive media such as videos, infographics, activities and course notes. There are many opportunities for collaborative learning via the discussion forums and you can leverage the portal to connect to other students around the world. During the course you can reference the case study example outlined in Module 1 or reference your own organisation. During the course students will develop a cyber strategy as part of their assessment, this can be based on their own organisation, the case study or a fictitious entity

YOUR SUPPORT

HIGH LEVEL OF SUPPORT – KEY TO SUCCESS

Head Tutor
Subject Expert

Course Manager
One to One Student Support

Technical Support
Available to Solve Tech Issues

Social Learning
Student Network Collaboration

Extended Network of Material
Recommended External Material

MODULE 1

UNDERSTANDING CYBER RISKS AND A LITTLE TECHNOLOGY

We explore the cyber threat landscape and gain an understanding of the key threat actors, their motivations and techniques. We review a number of high profile cyber attacks with a view to understanding why they were attacked and what could have been done to prevent the breach.  We outline a key “Case Study” example that is referenced through the rest of the course. 

MODULE 2

CYBER STRATEGY – THE BUSINESS CASE

We outline the importance and the anatomy of a cyber strategy. How a cyber risk framework operates and how it integrates with the organisation. Understand the differences between standards, policies, procedures, legal and regulatory controls.  We outline how to identify the business value chain of an organisation and the importance of business systems, assets and entities that support that channel. 

MODULE 3

CRQ – CYBER RISK QUANTIFICATION AND METRICS

We explore the traditional cyber metrics organisations leverage in relation to cyber security and risk and discuss “Meaningful Metrics” that empower the business. Calculating inherent cyber risk, residual cyber risk and aligning those metrics with business objectives. Informing and supporting the business with KPI’s (Key Performance Indicators) and KRI’s (Key Risk Indicators). Leveraging those metrics to develop appropriate maturity roadmaps and report and alert the business. 

MODULE 4

CYBER LEADERSHIP AND CULTURE

The role of leadership, the governance structure and supporting processes are outlined. The challenge of resourcing, attracting new and developing in-house talent.  Establishing a culture of loyalty and business protection.  Identifying gaps in leadership and supporting  a meritocracy based on talent and ability.  Converging the physical security efforts with cyber to deliver a holistic program of protection for your organisation. 

MODULE 5

CYBER RISK AND THE LAW

Understanding the complex myriad of cyber related laws, regulations and business requirements is a challenge. In this module, we outline International landscape of key laws and regulations including GDPR and the NIS Directive. Developing an approach to understanding how to identify what is relevant and may impact your current or future business model. We outline key approaches to identifying the nexus of control requirements and driving efficiency by aligning business, legal and regulatory drivers with business drivers. 

MODULE 6

CYBER RESILIENCE AND INCIDENT MANAGEMENT

We outline the minimum expectations of regulators when it comes to establishing cyber resilience.  Understanding preventative, detective and responsive controls. Best practices in aligning business continuity, disaster recovery and incident response with a program of cyber resilience. We outline the appropriate response to a breach. We focus on key aspects such as detection, communication and containment. We leverage the case study to outline the key aspects and learning points such as proactive strategies to detect an incident and containment strategies to mitigate the impact. 

MODULE 7

THIRD PARTY CYBER RISK – VENDORS AND REMOTE WORKERS

Every business is comprised of a business value chain. That is the various “links” or parts of the business that support the delivery of a particular service or channel. These links are often provided by third party partners, vendors or remote workers. We explore, how to identify, analyse, manage and report the associated risk to the business. The impact of the paradigm shift in the legal landscape including GDPR and how that factors into your approach. 

MODULE 8

PUTTING IT TOGETHER – DEVELOP A CYBER RISK STRATEGY

In this module, we outline how to put everything you have learned together. Students leverage the case study or their own organisations to develop a complete cyber risk strategy. Dissecting the Cyber DNA of the business, establishing key metrics and a maturity roadmap. Aligning with the business strategy and establishing a board level reporting process. Developing processes to measure and manage the implementation of the cyber risk strategy and report the RoI to the business. 

HEAD TUTOR

Paul C Dwyer – President of the ICTTF International Cyber Threat Task Force

Paul has been certified an industry professional by the International Information Security Certification Consortium (ISC2) and the Information System Audit and Control Association (ISACA) and selected for the IT Governance Expert Panel.
Paul is an honorary fellow of the ICS Irish Computer Society, approved by the National Crime Faculty and the HTCN High Tech Crime Network.
Paul has worked extensively around the world and his diverse career spans more than 25 years working with military, law enforcement, and the commercial sector. His roles have included:

  • President of the ICTTF International Cyber Threat Task Force
  • Co Chairman of the UK NCA National Crime Agency Industry Group
  • Advisor to NaCTSO (National Counter Terrorism Security Office)
  • Advisor to NATO on Countering Hybrid Cyber Threats
  • Advisor to UK Defence Committee DEFCOM in Parliament
  • Deputy Chair – Organised Crime Task Force Industry Group – NI
  • Interim Global CISO for numerous multi national organisations
  • Advisor to numerous governments and intelligence agencies

A prolific contributor to the industry and media, Paul is a professional public speaker and industry evangelist. He has also authored a number of industry works including a book aimed at boards of director entitled – “The Art of Cyber Risk Oversight”.
As an industry networker Paul is a member of a number of distinct groups including the IoD (Institute of Directors), IIEA (Institute of International and European Affairs) and the IRM (Institute of Risk Management).
As an accomplished serial entrepreneur he has successfully built a number of security practices in the UK & Ireland and in 2016 was identified by Business and Finance as one of Ireland’s Top 100 CEOs.
Paul started his career as a technical networking specialist, he then specialised, trained and qualified in a number of disciplines including but not limited to ethical hacking, forensics, international management systems, risk management, business continuity, international governance frameworks, financial service regulations, cyber laws and project management.

Paul is a native of Dublin, Ireland, lives there with his wife, daughter and Bernese mountain dog children

Paul C Dwyer CEO - BIO

“An eye opening course bringing to life exactly what a CISO is and maybe more importantly what is isn’t. Many lightbulb moments that will help refocus how to better align security with the business, and what it takes to be successful.” Mark Conabeare – CISO Debenhams

“An eye opener giving a global picture backed up with real world examples, Great Knowledge.” Shane O’Reilly – Head of IT – Total Produce

“Quality course content explained in easy to connect real life situations. Highly knowledgeable professionals in the world of cyber and reality.” Gerard Clear – Head of IT – Cabot Financial

FAQ's

Step one, is to apply for the course.

Successful certification depends on a number of factors. Your application includes an evaluation of your professional experience and if you are accepted you are enrolled for the online course.

The online course includes continual evaluation of your performance and competency.

If you meet all the certification requirements which includes the professional experience prerequisite, adoption of the ICTTF Code of Ethics and successful performance on the required curriculum and competency evaluation, you will be certified and entitled to all of the rights and privileges associated with the designation. You need to re-certify every three years.

Certification is by the board of the ICTTF International Cyber Threat Task Force and accredited by the ICA International Compliance Association.

A Cyber Risk Officer is an individual with the knowledge, skills and experience to develop, implement or support a cyber security, risk and/or privacy program at an organization. It is often a secondary role to a primary role such as CISO or CCO. Aspiring CISO’s and other business leaders often become certified cyber risk officers in order to augment and/or validate their background for new challenges and roles, including board levels positions such as NxD’s.

There is a Global IT security skills shortages and it has now surpassed four million according to a recent industry survey.

The number of unfilled positions now stands at 4.07 million professionals, up from 2.93 million this time last year. This includes 561,000 in North America and a staggering 2.6 million shortfall in APAC. The shortage of skilled workers in the industry in Europe has soared by more than 100% over the same period, from 142,000 to 291,000.

The global security workforce needs to increase by a staggering 145% to cope with a surge in hiring demand. In Europe, this has come particularly in smaller companies with one-99 employees, as well as those with over 500 employees.

In the report, over half (51%) of cybersecurity professionals said their organisation is at moderate or extreme risk due to staff shortages.

No. The syllabus has been developed for a non-technical audience. When technical concepts are referenced in any way, they are fully explained.

It is assumed that you have very limited IT technical knowledge. This course is for business leaders and provides them with the knowledge, skill and confidence to liaise with technical subject matter experts by demystifying the jargon and concepts.

Certification lasts for three years from the date awarded. Form June 2023 a recertification exam will be available online at www.icttf.org

There will be a fee of €500 for the recertification exam or any resits required. 

If students elect to recertify by reenrolling in the course, they have that option and will receive €500 discount off the cost of the course.  

The ICTTF – CCRO (Certified Cyber Risk Officer) course is delivered entirely online with a combination of live ILT (Instructor Led Training) sessions with the Head Tutor, recorded videos, downloadable case books and interactive material.

Course Overview

This is an eight week course prefaced by an “Orientation Module.

Orientation Module

Launch Date: Monday June 1st 2020 08:00

Overview: Introduction outlining the features of the online campus portal. Students get an opportunity to complete their online student profiles. Introductions to key support contacts.

Format: Video, PDF

Following the orientation module, each module becomes available on the Thursday morning of each week at 08:00. Each module is comprised of the following materials:

a) Reading Material (Case books and References in PDF Format)

  1. b) Videos (Covering the Module Topic)
  2. c) Live ILT session with Head Tutor (Live each Monday at 13:00 and available recorded)
  3. d) Recommended Extended Learning Material
  4. d) Online Assessment
  5. e) Assignment (Assignments are due by Wed 12:00)

Example:

Module 1 – UNDERSTANDING CYBER RISKS AND A LITTLE TECHNOLOGY

Launch Date: Thursday June 4th 2020 08:00

Live ILT Session: Monday June 8th 2020 13:00 –> 14:00

Assignment Due: Wed June 10th 17:00

Please note all times listed are GMT. The live ILT sessions are delivered via Zoom webinar format.

The structure of all educational modules (1-8) are similar.

 

It is advised  for the student to make an estimated commitment of 8-10 hours per week for each module. 

There is a written assignment as part of the first 7 modules.

These assignments contribute towards the continuous evaluation of students and form part of their overall assessment and scoring

 

Successful Certification and Scoring

The pass mark for successful certification on the CCRO course is 80%

Students are continually evaluated during the course. The scoring criteria is as follows:

Each Module Assessment Carries: 8% (Total 64%)

Course Participation (ILT Attendance, Interactions with Fellow Students, Forums, etc): 8%

Each Weekly Assignment (7) Carries: 4% (Total 28%)

 

Date

Time

Event

Mon June 1st

08:00

Orientation Module Available

Thu June 4th

08:00

Module 1 Available

Mon June 8th

13:00

Live ILT Session

Wed June 10th

17:00

Deadline to Complete Module 1 and Submit Assignment

Thu June 11th

08:00

Module 2 Available

Mon June 15th

13:00

Live ILT Session

Wed June 17th

17:00

Deadline to Complete Module 2 and Submit Assignment

Thu June 18th

08:00

Module 3 Available

Mon June 22nd

13:00

Live ILT Session

Wed June 24th

17:00

Deadline to Complete Module 3 and Submit Assignment

Thu June 25th

08:00

Module 4 Available

Mon June 29th

13:00

Live ILT Session

Wed 1st July

17:00

Deadline to Complete Module 4 and Submit Assignment

Thu 2nd July

08:00

Module 5 Available

Mon 6th July

13:00

Live ILT Session

Wed 8th July

17:00

Deadline to Complete Module 5 and Submit Assignment

Thu 9th July

08:00

Module 6 Available

Mon 13th July

13:00

Live ILT Session

Wed 15th July

17:00

Deadline to Complete Module 6 and Submit Assignment

Thu 16th July

08:00

Module 7 Available

Mon 20th July

13:00

Live ILT Session

Wed 22nd July

17:00

Deadline to Complete Module 7 and Submit Assignment

Thu 23rd July

08:00

Module 8 Available

Mon 27th July

13:00

Live ILT Session

Wed 29th July

17:00

Deadline to Complete Module 8 and Final Assessment

Course Completed – Results and Certifications Available

Registration

A booking online reserves your place, this does not guarantee your place.

Only payment in full of the course fees will guarantee your place.

You will be sent a registration email to complete your profile once payment in full has been received.

Course Cancellation

Due to unforeseen circumstances, ICTTF Ltd may be compelled to cancel the course at short notice. In such circumstances, registrants will be entitled to a full refund of their course fee, or the course fee can be credited towards a future course.

Cancellation

Notice of a registrant’s intention to cancel their registration must be made in writing (admin@ICTTF.org ) to ICTTF Ltd.

 

In such cases, registrants will have the following options:

·       Nominate a replacement to attend in their place. Such notice must be made in writing at least 5 days before the commencement of the course

·       Defer to a course commencing at a later date. Such notice must be made within 10 days of the commencement of the course and is subject to availability.

·       Registrants who fail to attend the course  will be charged 100% of the full fee.

Substitutions/ Replacements

Where a registrant who has to cancel nominates a suitable replacement to attend in their place, no cancellation penalty will be incurred. The suitable replacement must meet the Entry Requirements for the course.

Fees

Participants wishing to transfer to a later date will be billed a 10% administration fee plus any increase in the price of the course.

Changes to course

ICTTF reserves the right to change course content, structure, lecturers and dates