The Relevance of EPDs in the Composites Industry
7 Oct 2024
Read more >β Cyber security threats are relentless and growing. No business is immune. Protect yourself or risk falling victim to devastating cyber-attacks that can cripple your operations, steal sensitive data, and tarnish your reputation.
Act now to safeguard your digital assets by attending Tekgem’s and Teesside University’s Cyber Security workshop which is split into two sessions, the first introducing cyber security as a concept, and the second focusing on incident response plan development.
π
Tuesday 23rd May 2023
β°9.30 AM to 3.00 PM
π IDTC Lab, Stephenson Building, Teesside University, TS1 3BA
The day will consist of:
Introduction to Cybersecurity (9:00-12:30)
1. Introduction
2. Understanding Cybersecurity
β’ What is Cybersecurity?
β’ Why is Cybersecurity Important?
β’ Types of Cyber Attacks
β’ Cybersecurity Threats Landscape
β’ Cybersecurity Terminology
3. Basic Cybersecurity Concepts
β’ Understanding the CIA triad (Confidentiality, Integrity, Availability)
β’ Cybersecurity Controls and Strategies
β’ Password management and multi-factor authentication
β’ Network security and firewalls
β’ Malware and anti-malware solutions
β’ Social engineering attacks
4. Best Practices for Cybersecurity
β’ Cybersecurity policy and governance
β’ Incident response plan
β’ Security awareness training for employees
β’ Regular system updates and patch management
β’ Data backup and disaster recovery
β’ Cybersecurity risk management
5. Conclusion
β’ Recap of key takeaways
β’ Q&A session
Incident Response Plan Development (13:00-15:30)
1. Introduction
2. Understanding Cyber Security Incident Response
β’ What is a Cyber Security Incident Response Plan?
β’ Why is it important to have a Cyber Security Incident Response Plan?
β’ Types of incidents that require a response plan
β’ Incident response team roles and responsibilities
3. Developing a Cyber Security Incident Response Plan
β’ Identifying critical assets and data
β’ Creating an incident response plan framework
β’ Developing incident response procedures
β’ Defining escalation and notification processes
β’ Establishing communication channels and protocols
β’ Conducting regular training and testing
4. Implementing the Cyber Security Incident Response Plan
β’ Deployment and rollout of the plan
β’ Incident response team activation
β’ Incident response process workflow
β’ Documenting incidents and responses
β’ Continuous improvement and review
5. Conclusion
β’ Recap of key takeaways
β’ Q&A session
To be eligible you must be an SME within the Tees Valley with an annual turnover no greater than β¬50m per annum.
π§ Email idtc@tees.ac.uk to register your interest
By Teesside University
331 Views