Customise Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorised as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

No cookies to display.

Innovative Risk Management with NIST Enriched Methodology

Mar 6, 2025 | Information Security, Multi-Business

Innovative Risk Management with NIST Enriched Methodology

This is a vital importance training program which is consisted of 2 parts. The first part refers to the 14 hours academic sessions and the second part refers to 4 hours consulting within each company, in dates and times that will be agreed between the participant and the instructor/consultant.  

12 & 14/05/2025 (Limassol)

20 & 21/05/2025 (Larnaca)

14 hours lecture +

4 hrs consulting (new date)

Approved by HRDA

Description of the Training program

Risk Management includes the formulation of the risks faced by a company, their analysis, their classification according to rational criteria, the assessment of the probability of the risks occurring, the analysis of the consequences that will occur (in terms of customers, partners, staff, institutional framework, reputation, etc.). The result of this process is the ” Illustration ” of the consequences should the risk materialize and the ” Illustration ” of risks and consequences from language into numerical form to create the “Risk Matrix” of the Business. This will lead the business to explore proactive measures to reduce either the likelihood or consequences and mitigation plans for risks greater than an acceptable numerical threshold. At the same time, it will assist the Firm in selecting countermeasures that are consistent with the value of the resources they will protect, and in prioritizing the implementation of those countermeasures.

In the NIST methodology, the analysis of risks is done at more than one level – taxonomy levels (compared to other methodologies that analyze at only one level – flat analysis) and, in addition, the analysis of both the probability of the risks occurring and the consequences they will cause are synthesized in a multifactorial way through functions (not in a flat way, where the probability consists of only one component, but by defining through functions the components that make up the probability – the same is followed for the consequences). Therefore, in this way the company knows a) what it is at risk of, b) in which cases it is at risk, c) to what extent it is at risk per case, d) for each risk the consequences that are likely to occur and based on all this to prepare the mitigation or response planning and measures. 

The topics of the seminar are ideal for:

  • Business managers
  • Managers with decision making responsibilities related to the management of organizational or technological risks, such as, but not limited to, Directorates or Departments: Operations, Projects (or new projects), Planning, Production, Research and Development, Information Technology or Computerization, Human Resources (the name may vary by company)
  • Executives directly involved in proposing and/or making risk management decisions such as Data Protection Officers (DPOs), Risk Management Systems Officers, Information Security or Health and Safety Officers and internal auditors of similar systems.

 

If you are interested in the specific subsidized training program, contact us

Additional Information

Dates

fdafdsf

Duration

4

Location

4

Initial Cost

4

Subsidy

4

Cost After Subsidy

4

Program Number

4

Online registration

Signup today for free and be the first to get notified on new updates.