Course Introduction

Notification Preview

Course Objectives

Notification Preview

Unit One: The Importance of Information Security for Financial Institutions

11

Introduction

Objectives

The concept of information security

The Vital Role of Information Security in Protecting the National Economy

Types of Cybercriminal Activities

Reasons for the Increase in Cyber Threats

Challenges in Protecting Information Systems of Financial Institutions

Organized Crimes Against Financial Infrastructure

0

The Concept of Organized Crime

The Economic Impact of Organized Crime

Foundations for Combating Organized Crime

Activity

Summary

Assessment

Unit Two: Organized Crime and External Threats

9

Introduction

Objectives

First: Organized crimes targeting the financial sector and banks

0

Definition of organized crime

Characteristics of organized crime

Objectives of organized crime

Role of the Saudi Cybercrime Law

Role of international cooperation in combating organized crime

The role of financial institutions in enhancing compliance

Regulatory awareness for employees

Second: External threats facing financial institutions and banks

Activity

Summary

Assessment

Unit Three: Social Engineering

18

Introduction

Objectives

Definition of Social Engineering

Importance of Social Engineering

Key Techniques of Social Engineering

Internal Attacks

External Attacks

Targeted Phishing (Spear Phishing)

Hybrid Attacks

0

Combining Internal and External Threats

Human Factor Risk

Preventive Measures

Use your personal device

Safe use of the internet

Safe use of applications

Use e-mail

Social media

Remote work

Activity

Summary

Assessment

Unit Four: Data Privacy

11

Introduction

Objectives

Definition of Data Privacy

Importance of Data Privacy

Key International Standards for Data Protection

Data Privacy Protection Obligations

Consequences of Non-Compliance

Preventive Measures Against Data Privacy Breaches

Activity

Summary

Assessment

Unit Five: Legal Policies and Regulations

10

Introduction

Objectives

National Legislation Related to Information Security

0

Anti-Cybercrime Law

Saudi Personal Data Protection Law

Personal data owner

Controller

Processing entity

Definition of personal data

Classification of personal data

The importance of protecting personal data

Records of personal data processing activities

Data leak

Transfer personal data

Restrictions on copying official documents of data subjects

Handling health data and bank cards

Data retention and destruction provisions

Third party risk management

Privacy Notice and Consent

Data subject rights

Responding to data subject requests

Personal Data Protection Officer

Summary of general obligations

Appropriate guarantees when transporting

Offences and penalties

Best practices for protecting personal data

Importance of Legislation for Financial Institutions

Potential Practical Examples

International Standards for Data Protection

0

ISO 27001 Standard

General Data Protection Regulation (GDPR)

Benefits of Adhering to International Standards

Applying International Standards in the Financial Sector

Legal Responsibility of the Financial Institution in Data Protection

Legal Responsibility of Employees for Negligence in Data Protection

0

Employee Responsibility

Examples of Employee Negligence in Data Protection

Preventive Measures to Mitigate Data Security Threats

Activity

Summary

Assessment

Unit Six: Incident Reporting Policy

13

Introduction

Objectives

Definition of Reporting Policy

Objectives of the Reporting Policy

Role of Early Reporting in Risk Prevention

Role of Early Reporting in Loss Reduction

Internal Reporting Process

External Reporting Process

Key Standards for Effective Reporting

Whistleblower Rights

0

Whistleblower Protection

Whistleblower Rights under International Regulations

Activity

Summary

Assessment

Unit Seven: Protection of Sensitive Data

15

Introduction

Objectives

Definition of Sensitive Data

Types of Sensitive Data

Importance of Protecting Sensitive Data

Best Practices for Password Protection

Multi-Factor Authentication

Precautions for Protecting Sensitive Data

Privacy Policy

Steps for Handling Security Incidents in the Bank

0

First: Detecting the Security Incident

Second: Reporting the Incident

Third: Investigating the Incident

Fourth: Containing the Incident

Fifth: Resolving and Mitigating the Issue

Sixth: Preparing a Comprehensive Report

Incident Response Standards

Improving Future Incident Response

Activity

Summary

Assessment

Course Summary

Notification Preview