Day 1: Fundamentals and Emerging Trends
Session 1: Cybersecurity Governance and Strategy
- Overview of cybersecurity governance frameworks.
- Aligning cybersecurity with organizational objectives and risk appetite.
- Insights from the IRMSA 2024 Risk Report.
- Activity: Group discussion on organizational challenges in cybersecurity governance.
Session 2: Cyber Risk Landscape and International Trends
- Key cybersecurity risks in South Africa and global trends.
- Analysis of recent high-profile cyber incidents and lessons learned.
- The evolving threat landscape: ransomware, phishing, and supply chain attacks.
- Activity: Case study analysis—examining the impact of a global cybersecurity breach.
Session 3: Introduction to Penetration Testing –
- Role of penetration testing in identifying vulnerabilities.
- Methodologies and tools used in penetration testing.
- Practical considerations for implementing pen testing.
- Activity: Simulation walkthrough of a basic penetration testing scenario.
Session 4: Big Data and Cybersecurity –
- Leveraging big data for threat detection and response.
- Data privacy and protection regulations impacting cybersecurity.
- Tools and platforms for big data analytics in cybersecurity.
- Activity: Interactive demo of a big data analytics platform for threat monitoring.
Session 5: Robotics and AI in Cybersecurity
- Applications of robotics and AI in cybersecurity, such as anomaly detection and automated responses.
- Risks and controls related to robotics and AI technologies.
- Future trends and innovations in AI-driven cybersecurity.
- Activity: Brainstorm session on integrating AI into existing cybersecurity frameworks.
_________________________________________________________________________________
Day 2: Advanced Practices and Controls
Session 1: Cybersecurity Controls Frameworks
- Overview of key cybersecurity controls (NIST, ISO 27001, COBIT).
- Adapting international frameworks to South African contexts.
- Governance and reporting mechanisms for cybersecurity controls.
- Activity: Gap analysis exercise—mapping existing controls to a chosen framework.
Session 2: Incident Response and Recovery
- Building an effective incident response plan.
- Post-incident analysis and recovery strategies.
- Engaging stakeholders during and after a cybersecurity event.
- Activity: Tabletop exercise simulating a cyber incident.
Session 3: Integrating Cyber Risk into Enterprise Risk Management –
- Embedding cyber risk within the broader ERM framework.
- Using KRIs and KPIs to monitor cyber risk.
- Role of assurance providers in assessing cyber risk management effectiveness.
- Activity: Develop a cyber risk dashboard tailored to organizational needs.
Session 4: Cybersecurity Audits and Assurance –
- Best practices for auditing cybersecurity controls.
- Role of combined assurance in strengthening cybersecurity governance.
- Collaboration between internal and external assurance providers.
- Activity: Peer review exercise—participants assess a sample cybersecurity audit report.
Session 5: Future Outlook and Action Planning
- Emerging threats and technologies shaping the future of cybersecurity.
- Strategies for staying ahead of evolving risks.
- Personal action planning for implementing course insights.

