Program Name |
Cyber Law & the Legal Landscape |
Target Audience |
Legal Affairs Staff Members / other Members of the Legal Affairs Community |
Total number of delegates |
25 |
No. of training sessions |
1 |
Duration of Training Session |
3 days |
Number of hours per day |
5 hours (4 hours of lectures and 1 hour for practical exercises, Q & A, discussion of Use Cases) |
Training Location |
In House / Remote (Virtual Videoconferencing) |
Training Language |
English and/or Arabic (1 or 2 trainers per session) |
Training dates |
August – September 2020 |
Cyber Resilience |
Understanding the concept of Cyber Resilience |
Cyber Governance Strategy & Framework |
Risk Management & Ancillary Components:
|
Data Privacy & Data Protection |
Understanding the concepts of data, information, categories of data, privacy, personal data protection |
Data Governance and Compliance |
Introduction to and Understanding the concept of Governance and Compliance, as well as the essential elements thereunder |
Information Technology |
Introduction to and Understanding the concept of Information Technology |
Information Security / Cybersecurity |
Introduction to and Understanding the concept of Information Security / Cybersecurity |
Situational Awareness and Threat Intelligence |
Introduction to and Understanding the concept of Situational Awareness and Threat Intelligence |
Responsible persons within Organisations |
Understanding the Roles and Responsibilities of an Organisation’s members, concerning cyber activities:
|
The Cyber Legal and Data Protection Landscape of the KSA |
|
Forms of Cyber-attacks and cyber crimes |
(Narcotics or hallucinatory materials)
|
Statistics and the cost of Cybercrime in KSA, the Gulf region and Globally |
Understanding the stakes of monetary and other costs |
The Cyber Legal and Data Protection Landscape of the GCC |
|
The Cyber Legal and Data Protection Landscape globally |
|
|
|
Global Government, law enforcement, reporting / supervisory and informational authorities |
|
Use cases of Cyber Criminal Activities within the KSA |
In depth case study(ies) with demonstrations of tools and methods of extrapolation of evidential information and data |
Use cases of Cyber Criminal Activities within the GCC |
In depth case study(ies) with demonstrations of tools and methods of extrapolation of evidential information and data |
Cyber safety and security checklist and guidelines |
|