Cyber Risk Management for Decision Makers

  • Overview
  • Course Content
Overview

Cyber Risk Management for Decision Makers

Course Description

Cyber and non-cyber professionals face challenges in effectively protecting their organizations from ever-evolving cyber threats. You’ll be taught how to identify cyber risks, map their impact across an organization, prioritize concerns, and identify actionable mitigation strategies using hands-on labs and case studies. Decision makers will gain a vital understanding of what it takes to protect an organization's resources from cyberattacks.

Course Content

   RISK-CENTRIC APPROACH TO CYBERSECURITY

  •    Enterprise risk    
  •    Confidentiality, integrity, and availability risks    
  •    Using business or mission objectives to inform decision-making processes    

   UNDERSTANDING THE CYBER THREAT

  •    Costs of vulnerabilities and downstream impacts    
  •    Case studies    
  •    Cyber exploitation life cycle    

   CYBER RISK ASSESSMENT FRAMEWORKS

  •    National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)    
  •    NIST Risk Management Framework (RMF)    

   OVERCOMING DECISION MAKER CHALLENGES

  •    Cybersecurity terminology familiarity    
  •    Avoidance of bottom-up decision-making    
  •    Positioning selected defensive and preventative technologies    
  •    Cybersecurity expenditures justification    
  •    Human factors    

   THREAT AND VULNERABILITY MANAGEMENT

  •    Asset management    
  •    Leveraging threat intelligence    
  •    Determining when to eliminate, mitigate or tolerate vulnerabilities    

Session Details

  • Georgia Tech Research Institute (GTRI) employees are eligible to receive a discount.  If you are a GTRI employee, please go to the Organizational Development website and look for the coupon code under GT Professional Development. Review coupon instructions for more information.

Who Should Attend

This course is designed for executives, program managers, IT managers, customer care managers, field managers, and other professionals interested in reducing cyber incidents and minimizing their impact.

Coding boot camp professional working on laptop

What You Will Learn

  • Risk-centric approach to cybersecurity
  • The cyber threat
  • Cyber risk assessment frameworks
  • How to overcome decision maker challenges
  • Threat and vulnerability management
Cybersecurity professional working on computer

How You Will Benefit

  • Identify common risks prevalent in organizations.
  • Gain a high-level overview of cybersecurity concepts, laying the baseline for understanding their impact on a variety of organizational roles.
  • Correlate high-level security concepts to risks associated with people, processes, and technology.
  • Examine how to conduct cyber risk assessments.
  • Prioritize mitigations for identified risks.
  • Taught by Experts in the Field icon
    Taught by Experts in the Field
  • Grow Your Professional Network icon
    Grow Your Professional Network

The course schedule was well-structured with a mix of lectures, class discussions, and hands-on exercises led by knowledgeable and engaging instructors.

- Abe Kani
President

TRAIN AT YOUR LOCATION

We enable employers to provide specialized, on-location training on their own timetables. Our world-renowned experts can create unique content that meets your employees' specific needs. We also have the ability to deliver courses via web conferencing or on-demand online videos. For 15 or more students, it is more cost-effective for us to come to you.

  • Save Money
  • Flexible Schedule
  • Group Training
  • Customize Content
  • On-Site Training
  • Earn a Certificate
Learn More

Want to learn more about this course?