Booking options
£1,850
+ VAT£1,850
+ VATDelivered Online
Full day
All levels
AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology.
The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities.
At the end of this course, you will be able to:
Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience
Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities
Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute
Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities
Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities
Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities
Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities
Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities
Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls
Course Learning Objectives
Course Agenda
Activities
Course Book Structure
RESILIA Certification
What is Cyber Resilience?
Defining Cyber Resilience
Balancing in Cyber Resilience
Characteristics of Cyber Resilience
Understanding Risk Management: Discussion
Defining Risk Management
Addressing Risks and Opportunities
Why and What of Management Systems?
Management Systems
Common Management Standards and Frameworks
What is Strategy?
Cyber Resilience Strategy and Activities
Security Controls at Cyber Resilience Strategy
Interaction Between ITSM Processes and Cyber Resilience
Why Cyber Resilience Design?
Cyber Resilience Design Activities
Security Controls at Cyber Resilience Design
Aligning ITSM Processes with Cyber Resilience Processes
Why Cyber Resilience Transition?
Basics of Cyber Resilience Transition
Cyber Resilience Transition: Controls
Interaction Between ITSM Processes and Cyber Resilience
The Purpose of Cyber Resilience Operation
Security Controls in Cyber Resilience Operation
Interaction Between IT Processes and Cyber Resilience
Interaction Between ITSM Functions and Cyber Resilience
Continual or Continuous Improvement
Maturity Models
Continual Improvement Controls
The Seven-Step Improvement Process
The ITIL CSI Approach
Segregating Duties
Dual Controls