Curriculum
- 3 Sections
- 27 Lessons
- 1 Day
Expand all sectionsCollapse all sections
- Introduction to Cybersecurity in the BFSI Sector & Functional Risks18
- 1.1What is Cybersecurity?
- 1.2Confidentiality, Integrity, Availability (CIA Triad)
- 1.3Threats, Vulnerabilities, and Risks
- 1.4Key Terminology: Phishing, Ransomware, Malware, DDoS, Data Breach
- 1.5Securing Financial Data
- 1.6Regulatory Compliance (GDPR, PCI DSS, etc.)
- 1.7Cybersecurity Frameworks (NIST, ISO 27001)
- 1.8Risk Management Models and Strategies
- 1.9Importance of Encryption in BFSI
- 1.10Insider Threats vs External Threats
- 1.11Social Engineering and Phishing
- 1.12Distributed Denial of Service (DDoS) Attacks
- 1.13Advanced Persistent Threats (APTs)
- 1.14Financial Implications: Loss of client trust, fines, and legal consequences
- 1.15Operational Disruption: Downtime, system vulnerabilities
- 1.16Brand Damage: Reputational risk and customer churn
- 1.17Legal and Regulatory Consequences: Non-compliance penalties
- 1.18Scenario-based discussion: Identifying risks and threats in a simulated BFSI environment and analyzing their potential impact on operations.
- Case Studies of Cybersecurity Incidents4
- Best Practices and Proactive Cybersecurity Measures5
- 3.1Building a Strong Security Culture
- 3.2Multi-factor Authentication (MFA) and Encryption: Tools for securing BFSI data
- 3.3Regulatory Compliance: Aligning cybersecurity strategies with regulations (e.g., PCI DSS, GDPR)
- 3.4Reporting and Documentation: Ensuring transparency and accountability
- 3.5Action Plan Development: Create a set of best practices and a basic cybersecurity incident response plan tailored to organization’s needs, incorporating the lessons learned throughout the day.
Confidentiality, Integrity, Availability (CIA Triad)
Next