Duration: 1 Day
Language: English Class by Professional Trainer
Basic expertise: Basic understanding of Process management
DO YOU RECOGNIZE THIS?
The increasing importance of information to business operation and continuity means that information is becoming a critical asset that must be protected. International terrorism and increasing cyber theft and fraud has placed the need for information security high on the agendas of Both governmental and private sector organizations. Information security has been a capability that has been for too long ignored or not given the attention it deserves. Failing to do so is an unacceptable business risk for many organizations but this risk is not seen or felt by all.
Is your organization implementing Information Security processes and measures? Is the new technology implemented but your are experiencing difficulties getting the new behavior into the teams. Are you struggling to get Information security on the agenda and taken seriously?
The owner of a Tokyo Bank has decided to organize an exhibition of 3 very famous and attractive objects in the Tokyo Museum. A criminal team called Oceans99 has plans to steal the objects. The team consisting of museum owners, a transport manager, a security advisor and a project manager is responsible for realizing this project. The team has to develop an information security policy, security plans, performa a risks analysis to identify threats, implement measures and execute the project. The team will transport the objects from the museums to the Tokyo Museum, but Oceans99 is not to be underestimated. After each round the team will receive feedback as to how well they protected the objects and will have time to improve. Will the Sponsor (the Tokyo bank) realize a Return on Investment or will the exhibition become a drama.
Each of the simulations will be customized towards your own objectives. But in general these are the main objectives:
WHY IS THIS?
“This Oceans99 simulation is a good instrument to create overall security awareness. It involves employees, it shows the key processes and it creates overall understanding about the key principles of Information Security”