Cybersecurity: Incident Response, Forensic Analysis And Compliance
(14 CPEs)
2 Full Days, 14 Hours

18 - 19 July 2024

 St. Giles Boulevard Hotel, Kuala Lumpur

Don't Be Caught Off Guard!
Cyberattacks are not the matter of IF, but WHEN.

Cyber breaches can cost an organisation millions of dollars in repairs and recovery, and it is unsure if the organisation can even fully recover back to its pre-incident state.  While there are broad technical aspects to cyber incidents, there is also a myriad of other activities, which include communicating both internally and externally, considering the battle rhythm and taking a look at methodologies for tracking information gathered and released to the public. 


NO ONE
can predict or pick WHEN an organization will
face a major cyber incident,
but one can
CHOOSE the Level of Preparedness
when the incident takes place.

The Cybersecurity Response Process

1️⃣ Initial Incident Assessment: Incidents are detected, reported, and triaged.
2️⃣ Evidence Preservation: Maintaining the integrity and chain of custody of potential evidence. 3️⃣ Response Methodology: Gathering information and conducting forensic analysis.
(collecting and analysing data, examining network traffic and logs, and interviewing witnesses and involved parties) 

The goal is to identify attack vectors, entry points, and potential sources of compromise. Having a cybersecurity incident response process is crucial for organizations to effectively respond to cyber threats. By following a structured response process, organizations can uncover critical information about the incident, apply appropriate remediation measures, and prevent future occurrences. 

Master the Art of Incident Response & Forensic Analysis
to OUTSMART Cybercriminals!

A robust cybersecurity response process is the cornerstone of an organization's overall cybersecurity strategy.

Join Us in Our 14 Hour Intensive
Cybersecurity Incident Response, Forensic Analysis & Compliance Masterclass

This 2 days training endeavors to help those whose roles may require them to respond to a cyber-attack or breach. Participants will gain the knowledge and skills necessary to:

✅Establish a prompt and effective response to cybersecurity incidents
✅Minimize the damage caused by cyberattacks
✅ Identify and contain the cybersecurity incident during the investigation phase
✅Prevent the escalation of the cybersecurity incident
✅Become an effective incident management team member or leader
✅ Undertake preparatory work at different stages to help you get ahead of the situation

✨HIGHLIGHT: Case Scenarios, Group Discussions, Team-Based Exercises on designing & implementing a response framework and building an effective cyber response team.

BOOK YOUR SEAT NOW!
🔒Your information is 100% secure.
Programme Highlights
  • UNDERSTAND the importance of scoping incidents correctly
  • IDENTIFY the types of cyber threats, where and how to track the incident
  • UNDERSTAND the issues and challenges in handling security incidents
  • ESTABLISH security incident processes, policies, and procedures
  • DEFINE the incident management team's objectives
  • RECOGNISE the importance of managing team under pressure
  • GUIDE on Knowledge in the communication and coordination issues
  • PROVIDE information to Cyber Security Incident Response Team (CSIRT)
  • PLAN and control communication with stakeholders when managing incident
  • ANALYSE and assess the impact of computer security incidents
  • BUILD and test responses for various types of computer security incidents
JOIN US!
🔒Your information is 100% secure.
You Learn from the Expert Who Knows Your Business.

Hundreds of hours of research, study, planning and fine tuning go into the production of each of our trainings. Our course developers have looked at your industry’s needs. This course reflects the latest findings and best practices in your field today and addresses issues up-to-the-minute. You will get tools, tips, strategies that are proven and tested against real world situations as you learn from case studies and the experience of our expert trainers. Our trainings are comprehensive, in-depth, and packed with need-to-know information you can use as soon as you return to your workplace.

Introducing our World Class Trainer:

HO WAI KHIN

Wai Khin leads a team of professionals to manage the Firm’s and clients’ technology governance, risk, compliance (“GRC”) programmes to meet legal, human resources, audit, IT, risk management and information security requirements. With significant experience in this sphere, he engages in the innovation of ideas to implement value-added GRC programmes to support both the Firm’s and the client's organisational objectives to build robust GRC frameworks that go beyond regulatory compliance.

He is experienced in ISO 27001/Cyber Security Trust Mark certification projects, Singapore Monetary Authority of Singapore (MAS) Technology Risk Management review, MAS Outsourcing review, IT due diligence for mergers & acquisitions, SOX ITGC review, Singapore's Personal Data Protection Act (PDPA), and other internal and external IT compliance requirements.

Wai Khin previously provided in-house audit
assurances and security and business continuity advisory services for several organisations, while working for a Big 4 firm. He was also a recipient of the Cybersecurity Leader Awards 2022 and was conferred the “Leader Award” (Professional Category) in recognition of his contributions made in the cybersecurity space in Singapore.

GRAB YOUR SEAT!

 LIMITED TO 20 SEATS ONLY. 
🔒Your information is 100% secure.
WHO SHOULD ATTEND
Those with prior cyber security knowledge, professionals looking to
improve their cybersecurity response process:

- IT, Network Administrators, System Administrators, Cybersecurity Analysts

- Managers & Executives from HR, Customer Service, Sales, Admin, etc.

- Business Owners

How Our Trainings Are Conducted
LIST OF CORPORATE CLIENTS 

Akzonobel Paints, Allianz General Insurance, Alstom, Arvato Bertelsmann, AstraZeneca, BASF, Bayer, British American Tobacco, Canon Marketing, Chevron, CIMB, Bank Negara, Crowne Plaza Group of Hotels, EON, ETIQA, Fairchild, Gamuda Group, Gleneagles Hospital Group, IOI Group of Companies, JT International, LB Aluminum, MARCO Corporation, Maybank, NEC, OSK, Pantai Hospital Group, Pelabuhan Tanjung Pelepas, PIDM, Prudential Assurance Malaysia, SAMSUNG, Securities Commission, SHELL Refinery, Takaful Malaysia, UMW Toyota, Western Digital, and many more.

  SEATS LIMITED TO 20. 

Book a Call with us NOW!
🔒Your information is 100% secure.
WCTC Consulting is registered with