Information Security For BFSI

Hours
1

This programme is delivered online over 20 sessions of 60 mins each with Q&A . 

Participants
1

This programme is available for a minimum batch size of 10 participants.  

Start DATE
1 th

This programme starts on the 25th of every month.

This course provides an in-depth understanding of the information security scenario globally, the necessary measures to be taken for compliance with RBI regulations. This module brings about the awareness of the participants on the current trends. 
Pre Requisites
  • Understanding of computer operations e.g, sending and receiving emails
  • Using operating systems like windows etc. 
  • Understanding of the basics of networking 
Who should attend
  • Auditors
  • Professionals associated with Information Security team
  • Quality professionals
  • Project Managers
  • IT expert advisors
  • Chief Security Officers (CSOs)
  • Chief Information Security Officers (CISOs)
  • Chief Information Officers (CIOs)
Topics Covered
  1. Cyber Security Framework in Banking
  • Board Approved Cyber-Security Policy 
  • Arrangement for continuous surveillance 
  • IT architecture should be conducive to security 
  • Comprehensively address network and database security 
  • Ensuring Protection of customer information 
  • Cyber Crisis Management Plan 
  • Cyber security preparedness indicators 
  • Sharing of information on cyber-security incidents with RBI 
  • Supervisory Reporting framework 
  • An immediate assessment of gaps in preparedness to be reported to RBI 
  • ISO 27001 -Information Security Management System overview 
  • Cyber-security awareness among stakeholders / Top Management / Board 

2. Corporate Account Takeover

  • What is Corporate Account Takeover? 
  • How does it work? 
  • Types of Security Threats and Countermeasures 
  • Current Trends
  • How to Protect?
  • How to Detect?
  • How to Respond?
  • How to Remediate?
  • What to do when Fraud happens to us?

3. Cyber Exposure Awareness

  • Navigating the Modern Attack Surface Understanding Cyber Exposure 
  • Evolving from Vulnerability Management to Cyber Exposure Platform 
  • Measuring and Prioritizing Cyber Exposure 
  • Integrating Cyber Exposure with existing Infrastructure 
  • How to choose the right Cyber exposure platform 
Training Methodology
  • This is an online training program comprising live online classes, online content, recorded sessions, quizzes and tests.
  • Each Interactive Online Session will be for a maximum of 60 mins duration. The schedule will be worked out on a batch to batch basis.
  • Minimum batch size must be 10 Participants
  • Will involve active participation from the group