Cyber Risk Management for Decision Makers

Course Description

This course will help cyber and non-cyber professionals better understand the issues and concerns surrounding cyber risk management. Attendees will be taught how to identify high-level risks, map their impact across an organization, and identify actionable mitigation strategies using hands-on labs and case studies.

Course ID: DEF 4612P
Course Format: Classroom

Available Classroom Sections

There are no available sections for this course. Please check back later.

View previous sections
View Previous Sections
CRN Start date End date Format Location Cost
16302 Apr 12, 2016 Apr 13, 2016 Classroom Atlanta, Georgia $995
17182 Feb 15, 2017 Feb 16, 2017 Classroom Atlanta, Georgia $1,095
18269 Feb 14, 2018 Feb 15, 2018 Classroom Atlanta, Georgia $1,295

Special Discounts

GTRI employees are eligible for a discount on this course.  If you are a GTRI employee, please go to and look under “GT Professional Development” for a coupon code to use when checking out.

Note: Coupon codes must be applied during checkout and cannot be redeemed after your checkout is complete. Only one coupon code can be used per shopping cart.

Who Should Attend

Office managers, IT managers, customer care managers, field managers, and other professionals interested in protecting resources from cyber attack

How You Will Benefit

  • Recognize high-level cyber security concepts at a non-technical level
  • Identify common risks prevalent in organizations
  • Distinguish high-level security concepts to risks associated with technology, personnel, etc.
  • Examine how to conduct cyber risk assessments within multiple areas
  • Identify how to roll up multiple assessments across many areas into one comprehensive set of risks
  • Identify how to perform mitigation, acceptance, etc. with identified risks


  • Provide a high-level overview of cyber security concepts, laying the baseline for the identification of these concepts within a variety of organizational roles
  • Topics include: Vulnerabilities, Threats, Risk, Offense Methodologies, Defense Methodologies, Security Policies
  • Type, nature, and characteristics of threats
  • Impacts of threats, how they work, and how they’re deployed
  • Costs of vulnerabilities, downstream impacts, etc.
  • High-level offensive methodologies (“think like a hacker”)
  • Case studies and examples
  • Organizational value
  • Risk assessment
  • Decision making processes
  • Standards, ethics, and legal issues
  • High level cyber risk assessment techniques
  • Risk assessment team-based lab and outcome discussion
  • Risk management case study: success and failure