Cybersecurity Foundation Workshop
for Business Analysts

A comprehensive online full-day training delivered on Zoom, designed to equip business analysts with the knowledge and skills to holistically integrate cybersecurity principles into their practice.

Through a blend of theoretical foundations and practical applications, participants will learn how to protect their organisations from cyber threats while enhancing their business analysis capabilities.

Incomplete analysis. Missed risks. Overlooked threats.

In today’s digital landscape, excluding cybersecurity means delivering incomplete analysis. Business analysts must stay relevant, support organisational decision-making, and help not only co-create value, but also protect it.

Why Should You Do This Training

Deliver Complete Analysis

A business analyst must consider internal and external environments, current and future business landscapes, and the factors affecting the organisation. Excluding cybersecurity means analysis is incomplete.

Stay Relevant

Business analysts influence organisational decision-making and need the knowledge and skills to remain relevant in an ever-expanding cybersecurity landscape.

Fulfil the Responsibility

Business analysis is not just about helping organisations co-create value. It must also support protecting that value.

Pre-requisite

Attendees must understand business analysis or have experience working as an analyst.

No prior knowledge or experience in cybersecurity is required.

Who Should Attend

  • • Business Analysts or those using business analysis skills seeking to deepen their understanding of cybersecurity.
  • • Project Managers, Risk Managers, and IT Professionals involved in cybersecurity.
  • • Any professional interested in enhancing their knowledge and skills in integrating cybersecurity with business analysis.

Outcome

By the end of this training, participants will gain a clear understanding of cybersecurity concepts and practical skills to perform risk assessments, secure data flows, and incorporate cybersecurity into every stage of their projects.

This enables business analysts to contribute effectively to their organisation’s cybersecurity posture and become invaluable assets in the digital age.

Attendees will receive a “Cybersecurity for Business Analysis” Course Completion Certificate.

What You Will Learn

1. Introduction to Business Analysis and the Cybersecurity Mindset

  • • Explore the intersection of business analysis and cybersecurity with real-life cybersecurity incidents.
  • • Understand the critical role business analysts can play in safeguarding organisational assets.
  • • Develop a cybersecurity mindset essential for identifying and mitigating risks.
  • • Hands-on exercise on security mindset.

2. Foundation in Cybersecurity Concepts

  • • Gain a comprehensive overview of fundamental cybersecurity principles.
  • • Learn about common cyber threats, vulnerabilities, and the cybersecurity landscape based on real-life incidents.
  • • Understand key terminologies and concepts crucial for effective communication with IT and security teams.

3. Practical Skills to Perform Cybersecurity Risk Assessments

  • • Acquire practical tools and methodologies for conducting cybersecurity risk assessments.
  • • Learn to identify, analyse, and prioritize potential risks to business operations.
  • • Develop the ability to create actionable mitigation plans.
  • • Hands-on exercise on creating a risk register, identifying assets, recognising threats and vulnerabilities, prioritising them, and recommending mitigation solutions.

4. Practical Application of the Business Analysis and Cybersecurity Framework

  • • Apply the Business Analysis and Cybersecurity Framework (© 2024 I-Perceptions Consulting Ltd) designed to incorporate cybersecurity within business analysis.
  • • Hands-on exercise to apply the framework in various business contexts.
  • • Collaborate with peers to discuss strategies and solutions, enhancing practical understanding.

5. Data Security

  • • Understand the principles of data security.
  • • Overview on data classification.
  • • Difference between data security vs cybersecurity.
  • • Hands-on exercise on securing process flows.

6. Cybersecurity Extensions to IIBA BABOK

  • • Explore how cybersecurity can be extended into the IIBA BABOK knowledge areas.
  • • Learn about cybersecurity extension to the IIBA Business Analysis Core Concept Model (BACCM) checklist.
  • • Hands-on exercise on planning a stakeholder engagement plan which includes cybersecurity.
  • • Hand-outs on BABOK Knowledge Areas Extension to Cybersecurity and BACCM Cybersecurity Extension checklist.

7. Incorporating Cybersecurity in Every Stage of the Project by Shifting Left

  • • Understand the concept of “shifting left” in cybersecurity.
  • • Learn how to integrate security considerations from the earliest stages of a project.
  • • Develop strategies to embed cybersecurity into every phase of the project lifecycle.
  • • Practical implementation of extending the business analysis toolkit to cybersecurity at all phases of the project.
  • • Hands-on exercise in writing cybersecurity requirements, creating cybersecurity personas and scenarios.

8. Contributing to a Cybersecurity Business Case, Incident Response and Business Continuity Plans

  • • Components of a cybersecurity business case.
  • • Learn the challenges of writing cybersecurity business cases.
  • • Articulate the value of cybersecurity initiatives to stakeholders.
  • • Support the creation of compelling business cases based on cybersecurity industry standards and recommendations.
  • • Support the creation of incident response and business continuity plans.

How It Is Delivered

Course Format

  • • Interactive lectures and experiential learning.
  • • Hands-on activities and group exercises.
  • • Real-world case studies and scenarios.
  • • Flashcards and quizzes.

Prerequisites

  • • Basic understanding of business analysis concepts.
  • • Familiarity with cybersecurity fundamentals is helpful but not mandatory.
  • • Computer with camera, mic, speaker and high speed internet connectivity that supports seamless audio and video capabilities.
Bindu Liyanage

Led by Experience

Bindu Channaveerappa, Cybersecurity & Business Analysis Specialist

CBAP® Certified  |  20+ Years Industry Expertise

Available Dates

Full Days

Jan 23rd
9 - 5 pm UK time
Feb 20th
9 - 5 pm UK time
Mar 20th
9 - 5 pm UK time

Programme Access

Invest in your professional capability as a Business Analyst.

Full Programme Access

Purchase the workshop using the official training page.

For team or corporate rates, contact directly.

Book Workshop
Next
Next

IIBA - CCA Certificate in Cybersecurity Analysis Training