Full-day Online Training

What’s included

Full-Day Cybersecurity Training for Business Analysts: Integrating Security into Business Analysis

This comprehensive online full-day training delivered on Zoom is specifically designed to equip business analysts with the knowledge and skills necessary to holistically integrate cybersecurity principles into their practice. Through a blend of theoretical foundations and practical applications, participants will learn how to protect their organisations from cyber threats while enhancing their business analysis capabilities.

Why should you do this training:

To deliver complete analysis - A business analyst must be mindful of both the internal and external environments, affecting their organisation, along with the current and future landscapes of the business, while performing their analyses, so excluding cybersecurity is delivering incomplete analysis.

To stay relevant - Business analysts, as key players who influence organisational decision-making, must be equipped with the knowledge and skills to remain relevant in this ever-expanding landscape.

To fulfil their responsibility - Business analysis is a responsibility. It’s not just about helping organisations co-create the value but also must support in protecting it.

Pre-requisite:

Attendee must understand business analysis or have experience working as a analyst. No prior knowledge or experience in cybersecurity is required.

Who Should Attend:

  • Business Analysts or those using the business analysis skills seeking to deepen their understanding of cybersecurity.

  • Project Managers, Risk Managers, and IT Professionals involved in cybersecurity.

  • Any professional interested in enhancing their knowledge and skills in integrating cybersecurity with business analysis.

Outcome:

By the end of this training, participants will be equipped with a clear understanding of cybersecurity concepts and practical skills to perform risk assessments, secure data flows, and incorporate cybersecurity into every stage of their projects. They will also be proficient in using the IIBA BABOK knowledge areas and BACCM with cybersecurity extensions and in writing persuasive cybersecurity business cases. This training ensures that business analysts can effectively contribute to their organisation's cybersecurity posture, making them invaluable assets in the digital age.

Attendees will receive a "Cybersecurity for Business Analysis" Course Completion Certificate.

What you'll learn:

1.     An Introduction to Business Analysis and the Cybersecurity Mindset:

  • Explore the intersection of business analysis and cybersecurity with real-life cybersecurity incidents.

  • Understand the critical role business analysts can play in safeguarding organisational assets.

  • Develop a cybersecurity mindset essential for identifying and mitigating risks.

  • Hands-on exercise on security mindset

2.     Foundation in Cybersecurity Concepts:

  • Gain a comprehensive overview of fundamental cybersecurity principles.

  • Learn about common cyber threats, vulnerabilities, and the landscape of cybersecurity based on real-life incidents.

  • Understand key terminologies and concepts crucial for effective communication with IT and security teams.

3.     Practical Skills to Perform Cybersecurity Risk Assessments:

  • Acquire practical tools and methodologies for conducting cybersecurity risk assessments.

  • Learn to identify, analyse, and prioritize potential risks to business operations.

  • Develop the ability to create actionable mitigation plans.

  • Hands-on exercise on creating a Risk Register, identifying an asset, recognising the threats and vulnerabilities, prioritising them and recommending the mitigation solutions.

4.     Practical Application of the "Business Analysis and Cybersecurity" Framework:

  • Dive into the practical application of Business Analysis and Cybersecurity Framework (© 2024 I-Perceptions Consulting Ltd) designed to incorporate cybersecurity within business analysis.

  • Hands-on exercise to apply the framework in various business contexts.

  • Collaborate with peers to discuss strategies and solutions, enhancing your practical understanding.

5.     Data Security:

  • Understand the principles of data security

  • Overview on data classification

  • Difference between data security vs cybersecurity

  • Hands-on exercise to securing process flows

6.     Cybersecurity Extensions to IIBA BABOK:

  • Explore how cybersecurity can be extended into the IIBA BABOK knowledge areas

  • Learn about cybersecurity extension to IIBA Business Analysis Core Concept Model (BACCM) checklist

  • Hands-on exercise on planning a stakeholder engagement plan which includes cybersecurity

  • Hand-outs on BABOK Knowledge Areas Extension to Cybersecurity and BACCM Cybersecurity Extension checklist

7.     Incorporating Cybersecurity in Every Stage of the Project by Shifting Left:

  • Understand the concept of “shifting left” in cybersecurity.

  • Learn how to integrate security considerations from the earliest stages of a project.

  • Develop strategies to embed cybersecurity into every phase of the project lifecycle.

  • Practical implementation of extending business analysis toolkit to cybersecurity at all phases of the project.

  • Hands-on exercise in writing cybersecurity requirements, creating cybersecurity personas and scenarios

8.     Contributing to a Cybersecurity Business Case, Incident Response and Business Continuity Plans:

  • Components of a cybersecurity business case

  • Learn the challenges of writing a cybersecurity business cases

  • Articulating the value of cybersecurity initiatives to stakeholders

  • Provide support in write compelling business cases that highlight the importance of cybersecurity investments based on cybersecurity industry standards and recommendations.

  • Support in creating an incident response and business continuity plans  

November:

08/11/24

15/11/24

22/11/24

29/11/24

December:

06/12/24

13/12/24

20/12/24

Use LAUNCH40 for 40% OFF

Previous
Previous

Securing Data and Processes for Business Analysts

Next
Next

Half-day Online Masterclass: Equipping Business Analysts for the Cybersecurity Age