AXELOS RESILIA™: Cyber Resilience Best Practice is 3-day course designed to help commercial and government organizations around the world prevent, detect and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management and business. Active cyber resilience is achieved through people, process and technology.
The RESILIA Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities.
The RESILIATM Foundation course audience includes all teams across the IT and Risk functions, including:
- IT Service Management
- Operations and Incident management
- IT Change & Release management
- IT Supplier & Vendor management
- Business Analysis and Design
- Business analyst
- IT Architects
- IT Project & Programme Management
- Risk and Compliance
- Information Security management
- Business Continuity managers
Individuals certified at RESILIA Foundation will have demonstrated their knowledge of:
- The purpose, benefits, and key terms of cyber resilience.
- Risk management and the key activities needed to address risks and opportunities.
- The purpose of a management system and how best practices and standards can contribute.
- Cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities.
- Cyber resilience design, the associated control objectives and their interactions with ITSM activities.
- Cyber resilience transition, the associated control objectives, and their interactions with ITSM activities.
- Cyber resilience operation, the associated control objectives, and their interactions with ITSM activities.
- Cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities.
- The purpose and benefits of segregation of duties and dual controls.
Benefits of Taking This Course:
Participants to this course learn about the methods and use of preventative, detective, and corrective controls allowing them to recognize risks and to operate effectively in a challenging environment. The course provides insights into common management standards and best practice frameworks that would assist in making decisions to anticipate, counter and/or recover accordingly from cyber-attacks. Participants on completing this course would be better positioned in an organization to effectively govern, manage and comply with cyber resilience.
Please contact us for a detailed course outline.