Leader in the cybersecurity training sector.

The challenges of cyber security in the organisation - for senior managers

Catégorie
Satisfaction rate
4.8
Success rate
4.8

The target audience for training

  • Company directors,
  • Company executive,
  • IT Manager.

What you will learn

At the end of the course, trainees will be able to grasp the strategic issues and keys to digital security within their organisation.

Training programme

Day 1

Day 1 - Morning: Understanding cyber security as a strategic issue

  • Introduction: an overview of cybersecurity and its impact on business performance.
  • Current threats and trends (cybercrime, espionage, sabotage, reputational risks).
  • Financial, legal and image consequences for organisations.
  • Ro le managers in their company's digital resilience.
  • Case study: high-profile cyber attack and analysis of strategic impact.
    • Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.

 

Day 1 - Afternoon: Governance and regulatory obligations

  • Cybersecurity and corporate governance: the role of the Board of Directors, senior management and the CIO.
  • Integrating cyber security into the organisation's overall strategy.
  • Regulatory frameworks and legal obligations: RGPD, NIS2, DORA, sectoral directives.
  • Cyber insurance and contract management with third parties.
  • Practical exercise: simulating decision-making by a management committee in the face of a cyber crisis.
    • Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.

Day 2 - Morning: Developing a culture of cybersecurity

  • Raising awareness and mobilising employees around cyber issues.
  • Internal policies: user charters, access management, supplier control.
  • Managing strategic cybersecurity indicators (KPI/KRI).
  • Internal and external communication in the event of a cyber incident.
  • Practical workshop: drawing up a cyber awareness plan and a cyber roadmap tailored to your organisation.
  • Closing and final assessment.
  • Participants receive their certificates of attendance and a course evaluation.
    • Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.

Trainer profile

Expert consultant-trainer in cybersecurity, whose technical, professional and teaching skills have been rigorously assessed and validated as part of our internal selection procedures.

Teaching methods and resources

The training is based on a balanced combination of theoretical and practical approaches, guaranteeing both the acquisition of knowledge and its rational application:

  • Structured theoretical input, illustrated by practical examples tailored to the participants' professional context.
  • Practical exercises at each stage to help you learn.
  • A case study linking the different skill blocks.
  • Strong interaction between trainers and trainees, making exchanges more concrete and in correlation with trainees' expectations.
  • Complete educational documentation, supplied in paper or digital format.
  • Course evaluation questionnaire at the end of the course, analysed by our teaching team.
  • Certificate of acquired skills sent to the trainee at the end of the course.
  • End-of-training certificate sent at the same time as the invoice to the company or funding organisation, confirming that the trainee has completed the session.

Training objectives

  • Understanding the strategic challenges of cyber security within an organisation
  • Situate cybersecurity within corporate governance and adapt your approach
  • Knowing the regulatory framework and le gales obligations
  • Fostering a cyber culture within the company

Assessment method

  • Practical exercises at every stage of the course.
  • A case study linking the different skill blocks.
  • Quiz at the end of each day's training.
  • Self-assessment of knowledge acquired by the trainee via a questionnaire.

Training prerequisites

There are no pre-requisites for this course.

Book Now

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
1 personne
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "1 personne" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.