Certified Cyber (Governance Risk and Compliance) Professional - CC(GRC)P, distance learning and online certification program

Overview

Cybersecurity has become a major priority for companies and organizations around the world. There are millions of cybersecurity positions open and unfilled, and a shortage of cyber security talent.

Companies and organizations need cybersecurity professionals equipped with the knowledge, skills, and abilities to stay ahead of, and to cope with, evolving threats and vulnerabilities.

Cybersecurity risk management comprises the full range of activities undertaken to protect IT and data from unauthorized access and other cyber threats, to maintain awareness of cyber threats, to detect anomalies and incidents adversely affecting IT and data, and to mitigate the impact of, respond to, and recover from incidents.

Effective risk management involves more than just protecting IT and data currently in place. It also requires planning so that maintenance, improvements, and modernization occur in a coordinated way and with appropriate regularity.

Objectives

The CC(GRC)P program has been designed to provide with the knowledge and skills needed to understand and support firms and organizations in cyber risk and compliance management. The course provides with the skills needed to pass the Certified Cyber (Governance Risk and Compliance) Professional - CC(GRC)P exam.

Target Audience

The CC(GRC)P certification program is beneficial to:
- Managers and employees working at the strategic, tactical, and operational levels of information security, IT and risk management.
- Information security managers, employees, auditors, and consultants.
- Threat analysts.
- Vulnerability assessment managers, employees, auditors, and consultants.
- Risk and compliance managers, employees, auditors, and consultants.
- IT managers, employees, auditors, and consultants.
- Network, systems and security administrators.
- Senior managers involved in risk and compliance management.
- Data protection and privacy managers, employees, auditors and consultants.
- IT, information security, risk and compliance management vendors, suppliers, and service providers.

Course Synopsis

Part 1: Introduction

- Demand for Cyber Risk / Information Security Professionals … and compensation.
- Introduction to Cyber (Governance, Risk, Compliance).
- From Cyberspace to Information Operations (IO) to Cyber Espionage.
- Cyber risks today, and what is different for organizations and employees.

Part 2: Attacks and Modus Operandi

- Who is the attacker?

- Eleven types of internet security attacks.
- 1. Attacks on the critical infrastructure.
- 2. Attacks on the internet infrastructure.
- 3. Deliberate persistent attacks on specific resources.
- 4. Widespread automated attacks against internet sites.
- 5. Threats, harassment, and other criminal offences involving individual user accounts.
- 6. New types of attacks or new vulnerabilities.
- 7. Botnets.
- 8. Denial of Service (DoS) and Distributed Denial of Service (DDoS).
- 9. Forgery and misrepresentation.
- 10. Compromise of single desktop systems.
- 11. Copyright violations.

Modus Operandi

Step 1 - Collecting information about persons and systems
- Reconnaissance: The research phase used to identify and select targets.
- Looking for information about the systems.
- Looking for information about the persons working in the target organization (or for the target organization).
- Outsourcing and budget cuts can have hidden costs.
- Who has signed a confidentiality agreement? A good list of prime targets for all adversaries.
- Looking at our daily activities from the adversaries' point of view.
- More prime targets: Disgruntled employees, ideologists, employees having a lavish lifestyle, employees having “weaknesses”, lawyers having access to trade secrets and sensitive information.

Step 2 - Identifying possible targets and victims
- Hardware attacks, software attacks.
- Malicious hardware modifications: Acquiring hardware components with a backdoor, and how it affects all other information security policies.
- Phishing, social phishing, spear phishing, watering hole attacks.
- Which systems and which persons? The hit list.

Step 3 - Evaluation, recruitment and testing
- Exploiting more vulnerabilities in certain systems.
- Deciding to work more with certain persons.
- Blackmailing employees: The art and the science.
- Testing the asset.
- The problem with the sleeper agents.

Step 4 - Privilege escalation
- A. Vertical privilege escalation, where adversaries grant themselves higher privileges.
- B. Horizontal privilege escalation, where adversaries use the identity of other users with similar privileges.
- Obtaining customer account details.
- Internal information, social engineering.

Step 5 - Identification of important clients and stakeholders
- Attackers have access to personal information. What is next?
- Identifying important clients and stakeholders working in the public and the private sector.
- Repeating the process - Steps 1 to 4.

Step 6 - Critical infrastructure
- Creating backdoors.
- Covering their tracks.
- Ticking time bombs and backdoor triggers based on specific input data.
- Selling information in the secondary markets (to other attackers, competitors, spies and the organized crime).

- The deep web.
- The dark web.

- Examples and case studies.

Part 3: Information Warfare, Cyber Espionage

Information Warfare

- The famous paradoxical trinity of Clausewitz.
- Cyberspace – a domain of war.
- Jus ad bellum, jus in bello, jus post bellum.

- Article 2(4) and Article 51, United Nations (UN) Charter.
- Interpretations of Article 2(4) and Article 51.

- From the International Strategy for Cyberspace, to the G7 Finance Ministers and Central Bank Governors, to the Law of War Manual, Cyber Operations.

- Information Operations (IO).
- 1. Electronic warfare (EW).
- 2. Computer network operations (CNO).
- 3. Psychological operations (PSYOP).
- 4. Military deception (MILDEC), and
- 5. Operations security (OPSEC).

- Information Operations and their supporting capabilities.
- 1. Information Assurance.
- 2. Physical Security.
- 3. Physical Attack.
- 4. Counter Intelligence.
- 5. Combat Camera.

- Defensive Information Operations.

- Net-centric warfare.

- Cyberspace and national security.

- Hackers, Spies, or Hybrid Warfare?
- The Gerasimov’s Doctrine.

- Case Studies.

Cyber Espionage

- Espionage, Intelligence.
- Political, Economic, Military Intelligence.
- Competitive Intelligence vs. Economic or Industrial Espionage.
- From UK, MI5.
- From UK SIS, MI6.
- From UK, Centre for the Protection of National Infrastructure (CPNI).

- Counterintelligence (CI).

- Cyber Espionage.

- Case studies.

- Strategic counterintelligence.

- The Ten Commandments of Counterintelligence (from James M. Olson that served in the Directorate of Operations of the CIA) that apply in Cybersecurity.

- Gentlemen don’t read each other’s mail?

Part 4: Defense

- Cyber Hygiene.

- The U.S. National Institute of Standards and Technology Cybersecurity Framework (NIST CSF).

- 1. The Framework Core.
- 2. The Framework Implementation Tiers.
- 3. The Framework Profile.

- The Functions:
- a. Identify.
- b. Protect.
- c. Detect.
- d. Respond.
- e. Recover.

- From ID.AM-1: Physical devices and systems within the organization are inventoried, to ID.AM-6: Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established.

- From ID.BE-1: The organization’s role in the supply chain is identified and communicated, to ID.BE-5: Resilience requirements to support delivery of critical services are established.

- From ID.GV-1: Organizational information security policy is established, to ID.GV-4: Governance and risk management processes address cybersecurity risks.

- From ID.RA-1: Asset vulnerabilities are identified and documented, to ID.RA-6: Risk responses are identified and prioritized.

- From ID.RM-1: Risk management processes are established, managed, and agreed to by organizational stakeholders, to ID.RM-3: The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis.

- From PR.AC-1: Identities and credentials are managed for authorized devices and users, to PR.AC-5: Network integrity is protected, incorporating network segregation where appropriate.

- From PR.AT-1: All users are informed and trained, to PR.AT-5: Physical and information security personnel understand roles & responsibilities.

- From PR.DS-1: Data-at-rest is protected, to PR.DS-7: The development and testing environment(s) are separate from the production environment.

- From PR.IP-1: A baseline configuration of information technology/industrial control systems is created and maintained, to PR.IP-12: A vulnerability management plan is developed and implemented.

- From PR.MA-1: Maintenance and repair of organizational assets is performed and logged in a timely manner, with approved and controlled tools, to PR.MA-2: Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access.

- From PR.PT-1: Audit/log records are determined, documented, implemented, and reviewed in accordance with policy, to PR.PT-4: Communications and control networks are protected.

- From DE.AE-1: A baseline of network operations and expected data flows for users and systems is established and managed, to DE.AE-5: Incident alert thresholds are established.

- From DE.CM-1: The network is monitored to detect potential cybersecurity events, to DE.CM-8: Vulnerability scans are performed.

- From DE.DP-1: Roles and responsibilities for detection are well defined to ensure accountability, to DE.DP-5: Detection processes are continuously improved.

- RS.RP-1: Response plan is executed during or after an event.

- From RS.CO-1: Personnel know their roles and order of operations when a response is needed, to RS.CO-5: Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness.

- From RS.AN-1: Notifications from detection systems are investigated, to RS.AN-4: Incidents are categorized consistent with response plans.

- From RS.MI-1: Incidents are contained, to RS.MI-3: Newly identified vulnerabilities are mitigated or documented as accepted risks.

- From RS.IM-1: Response plans incorporate lessons learned, to RS.IM-2: Response strategies are updated.

- RC.RP-1: Recovery plan is executed during or after an event.

- From RC.IM-1: Recovery plans incorporate lessons learned, to RC.IM-2: Recovery strategies are updated.

- From RC.CO-1: Public relations are managed, to RC.CO-3: Recovery activities are communicated to internal stakeholders and executive and management teams.

- The Framework Implementation Tiers (“Tiers”).
- From Partial (Tier 1) to Adaptive (Tier 4).

- The Framework Profile.

- Coordination of Framework Implementation.

- Establishing or Improving a Cybersecurity Program.
- Step 1: Prioritize and Scope.
- Step 2: Orient.
- Step 3: Create a Current Profile.
- Step 4: Conduct a Risk Assessment.
- Step 5: Create a Target Profile.
- Step 6: Determine, Analyze, and Prioritize Gaps.
- Step 7: Implement Action Plan.

- Methodology to Protect Privacy and Civil Liberties.

- Governance of cybersecurity risk.

- Awareness and training measures.
- Penetration Testing.

- Guidance from the Securities and Exchange Commission (SEC), Division of Corporation Finance, regarding disclosure obligations relating to cybersecurity risks and cyber incidents.

- The new international standards for cyber security after Regulation (EU) 2016/679 (General Data Protection Regulation).

Part 5: The future

- The attribution problem.
- The second attribution problem.
- Plausible deniability.
- Misinformation, disinformation, deception, fabrication.
- Disinformation management.

- ENISA, Disinformation operations in cyber-space.
- ENISA, Active Defense and Offensive Countermeasures.

Payment
For secure payment we work with PayPal, the faster and safer way to make online payments. With PayPal we minimize the cost of administration and compliance with national and international laws, so we can keep the cost of our programs and services so low.

Only PayPal receives your credit card number and your financial information. We receive your full name, your email, and your mail address. According to the PayPal rules, you have the option to ask for a full refund up to 60 days after the payment. If you do not want one of our programs or services for any reason, all you must do is to send us an email and we will refund the payment, no questions asked.

When you click "Buy Now" below, you will be redirected to the PayPal web site. Your payment will be received by our strategic partner and service provider, Cyber Risk GmbH (Rebackerstrasse 7, 8810 Horgen, Switzerland, Handelsregister des Kantons Zürich, Firmennummer: CHE-244.099.341). Cyber Risk GmbH may also send certificates to all members.

We will send the program up to 24 hours after the payment. Please remember to check the spam folder of your email client too, as emails with attachments or heavier than 100KB are often landed in the spam folder.

The all-inclusive cost is $297. There is no additional cost, now or in the future, for this program.

 

What is included in the price:

A. The official presentations (1,010 slides)

The presentations are effective and appropriate to study online or offline. Busy professionals have full control over their own learning and are able to study at their own speed. They are able to move faster through areas of the course they feel comfortable with, but slower through those that they need a little more time on.

B. Up to 3 online exam attempts per year

Candidates must pass only one exam to become CC(GRC)Ps. If they fail, they must study the official presentations and retake the exam. Candidates are entitled to 3 exam attempts every year.

If candidates do not achieve a passing score on the exam the first time, they can retake the exam a second time.

If they do not achieve a passing score the second time, they can retake the exam a third time.

If candidates do not achieve a passing score the third time, they must wait at least one year before retaking the exam. There is no additional cost for any additional exam attempts.

To learn more, you may visit:

www.risk-compliance-association.com/Questions_About_The_Certification_And_The_Exams_1.pdf

www.risk-compliance-association.com/CC(GRC)P_Certification_Steps_1.pdf

C. The certificate

Processing and posting via registered mail with tracking number.


Frequently Asked Questions

1. How comprehensive are the presentations? Are they just bullet points?

Answer: The presentations are not bullet points. They are effective and appropriate to study online or offline.

2. Do I need to buy books to pass the exam?

Answer: No. If you study the presentations, you can pass the exam. All the exam questions are clearly answered in the presentations.

If you fail the first time, you must study more. Print the presentations and use Post-it to attach notes, to know where to find the answer of a question.

3. Is it an open book exam? Why?

Answer: Yes, it is an open book exam. Risk and compliance management is something you must understand and learn, not memorize. You must acquire knowledge and skills, not commit something to memory.

4. Do I have to sit for the exam soon after receiving the presentations?

Answer: No. You can sit for the exam from your office or home, any time in the future. Your account never expires and there is no restriction of any kind.

5. Do I have to spend more money in the future to remain certified?

Answer: No. Your certificate never expires. It will be valid, without the need to spend money or to sit for another exam in the future.

6. Ok, the certificate never expires, but things change.

Answer: Recertification would be a great recurring revenue stream for the association, but it would also be a recurring expense for our members. We resisted the temptation to "introduce multiple recurring revenue streams to keep business flowing", as we were consulted. No recertification is needed for our programs.

Things change, and this is the reason you need to become (at no cost) a member of the association. You will receive our newsletter every Monday, with updates, alerts and opportunities, to stay current.

7. How many hours do I need to study to pass the exam?

Answer: You must study the presentations at least twice, to ensure you have learned the details. The average time needed is about 35 hours, but there are important differences.

8. I want to learn more about the online exam.

Answer: You will be given 90 minutes to complete a 35-question multiple-choice exam. You must score 70% or higher.

We do not send sample questions. If you study the presentations, you can score 100%.

9. Why should I get certified?

Answer: Firms and organizations hire and promote "fit and proper" professionals who can provide evidence that they are qualified.

Employers need assurance that employees have the knowledge and skills needed to mitigate risks and accept responsibility. Supervisors and auditors ask for independent evidence that the process owners are qualified, and that the controls can operate as designed, because the persons responsible for these controls have the necessary knowledge and experience.

The marketplace is clearly demanding qualified professionals in risk and compliance management. Certified professionals enjoy industry recognition and have more and better job opportunities.

It is important to get certified and to belong to professional associations. You prove that you are somebody who cares, learns, and belongs to a global community of professionals.

10. Why should I choose your certification program?

Answer: We strongly believe that we offer very good value for money:

1. The all-inclusive cost of the program ($297) is very low. There is no additional cost for this program, now or in the future, for any reason.

2. There are 3 exam attempts per year that are included in the cost of the program, so you do not have to spend money again if you fail.

3. No recertification is required. Your certificate never expires.