Mastering Cyber Threat Identification
and Defense Strategies
September 12th & 19th, 2023 | 10:00 AM – 2:30 PM EST | Online
Training Overview
Mastering Tactics, Techniques, and Procedures (TTP’s)
In today’s digital landscape, cyber risks have become a top concern for the public sector, with increased potential for sabotage. It is of utmost importance to develop a comprehensive understanding of the tactics, techniques, and procedures (TTPs) employed to effectively defend against these evolving threats
Mastering Cyber Threat Identification in the Public Sector has been designed to give public sector cyber professionals the practical advice and tools necessary to recognize and effectively neutralize cyber risks. This curriculum is comprised of six highly-intensive modules designed specifically for public sector employees to help them identify and mitigate cyber threats.
Who Should Attend
This training course is designed for employees of public sector organizations, including government agencies and critical infrastructure providers, who are responsible for cybersecurity and risk management including:
Cybersecurity Analysts, Operations and Risk Leaders
IT and Data Team Leads
Policy and Compliance Officers
Learning Outcomes
Gain knowledge and skills to identify and mitigate cyber threats in your organization
Learn about the latest tactics, techniques, and procedures used by cyber attackers
Better equipped to handle incident response planning for cyber attacks
Safeguard critical infrastructure and sensitive data
Engage in hands-on exercises and case studies to reinforce learning
Meet Your Facilitator
TOM BIGOS, CISSP
Certified Information
Systems Security Professional
Tom is a seasoned Cyber Security veteran with over 13 years of experience in the field and more than 20 years of experience in Information Technology. Throughout his career, Tom has worked with a diverse range of clients, including law enforcement, water and power utilities, local government, manufacturing, law firms, and other businesses in both Canada and the USA. His extensive knowledge stems from hands-on, in-the-field penetration engagements and testing, giving him a unique view into the world of Cyber Security from both an attacker and defender perspective.
In addition to his professional work, Tom is passionate about education and enjoys sharing his expertise with others. He has taught students, clients, and organizations how to detect, defend, and self-attack their infrastructure to better understand the methods used by threat actors in exploiting vulnerabilities. Most recently, Tom served as the primary instructor for a 13-week college-level course, where he trained the next generation of penetration testers and ethical hackers. With his unique educational approach and experience, Tom is sure to captivate and enlighten audiences at any speaking engagement.
Session Overview
Introduction to Cyber Threats and TTPs
- Overview of common cyber threats faced by the public sector
- Introduction to TTPs and their importance in identifying and mitigating cyber threats
- Examples of recent cyber attacks on public sector organizations
Understanding Attack Vectors and Techniques
- Overview of common attack vectors used by cybercriminals
- Analysis of common attack techniques such as phishing, social engineering, and malware attacks
- Case studies of successful cyber attacks on public sector organizations
Mastering Threat Intelligence Analysis for Cybersecurity
- Understanding the importance of threat intelligence in identifying and mitigating cyber threats
- Gathering and analyzing threat intelligence data
- Techniques for monitoring threat intelligence sources and identifying potential threats
Effective Incident Response Planning
- Importance of having an incident response plan in place
- Developing an incident response plan specific to the public sector organization
- Conducting regular incident response training and testing
Mastering Cybersecurity Best Practices
- Overview of cybersecurity best practices for the public sector
- Developing strong passwords and implementing multi-factor authentication
- Recognizing and reporting phishing attempts
- Protecting sensitive data and maintaining data privacy
Anticipating Emerging Threats and Future Trends in Cybersecurity
- Analysis of emerging cyber threats facing the public sector
- Understanding of the future trends in cyber threats and TTPs
- Strategies for staying up-to-date and continuously improving cybersecurity measures.