Course Outline
Program
Module 1: Process vision
- Concepts and definitions.
- Types of cybersecurity processes concerned: operational (e.g.:
- intrusion testing campaigns) and governance (e.g. review of a
- risk management)
- The 2 main models of BPMN 2.0.
Module 2: Process modeling
- Approach the modeling of a process.
- Introducing Signavio™ Quick Model.
- Introducing Bizagi™ Modeler.
- Basic components of BPMN 2.0.
Workshop: simple modeling of cybersecurity, operational and governance processes.
The workshop can focus on the processes planned in the training, or on processes at the request of the trainees.
Module 3: Implementation in stages
- Cybersecurity audit.
- Simple modeling of security processes.
- Advanced modeling of security processes.
- Process execution.
- Process monitoring with BAM (Business Activity Monitoring).
Workshop: reflection on implementation in a concrete case. List of deliverables at the end of this reflection.
The workshop can focus on the process planned in the training, or on a process at the request of the trainees.
Module 4: Putting the BPM vision into perspective with others
- Methodologies
- BPM and Lean Six Sigma.
- BPM and ITIL.
- BPM and ISO standards.
- BPM and ISM (Information Security Management).
Workshop: study of the existing situation in the trainees' company.
Requirements
There are no specific requirements needed to attend this course.
Testimonials (7)
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us
Raheal Akhtar - Dubai Government Human Resources Department
Course - Certified Ethical Hacker
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
A wide range of knowledge of the lecturer.
Marcin Szklarski - Santander Consumer Bank
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
the balance between lectures and practice, the rhythm, the trainer knowledge and pedagogic skill