Cyber Security Strategy - Development, Implementation & Continuous Improvement

Those who fail to plan, plan to fail, goes the common saying. Any cyber security program without a well-thought-out and documented overarching strategy, bought into by senior leadership, is doomed. Cyber security is a journey, not a destination—a program that starts but never ends. To this end, those responsible for steering the program must have, at the very minimum, a clear picture of what they need to do in order to be confident that the program will support NOT inhibit the business. 

In this course, students will learn about the elements of a business-focused cyber security strategy and the necessary steps required to ensure its successful implementation and continuous improvement. Through a practical strategy development activity and discussions on our crowd-learning platform, learners will gain tremendous insight into an effective way of leveraging the people, process, and technology aspects of their cyber security program to support organizational goals.

Digital Security Considerations for Mergers and Acquisitions

This course teaches seasoned cyber security practitioners how to ensure that the cyber security posture of an acquiring organization is not lowered as a result of the weak posture of an acquired asset or entity. When an organization acquires an asset as part of its growth strategy, that asset can constitute a liability from a cyber security standpoint. Business leaders need to be aware of this reality and demand thoroughness from the cyber security department