As organizations accelerate their digital transformation initiatives, they are focusing their investments in leveraging emerging information technologies for competitive advantage. It has become essential to understand how to effectively and efficiently manage an organization’s security resources, to reach these objectives. There are numerous strategic, tactical, and operational choices to be made about managing security resources and it is essential to ensure that IT and non-IT executives across the organization work in harmony.
Experience has made it clear that organizations need well-conceived organizational structures, skills, processes, and decision rights to ensure that information technologies and assets are appropriately secure as they are leveraged across the organization, especially when considering the impact that emerging information technologies is having.
This course prepares executives/professionals by providing a comprehensive understanding of the fundamental decisions related to cyber security. The course will also provide an overview of current and future relevant security related considerations and technologies, and the importance they play in organizations and associated stakeholders.
The course is designed to be delivered live/synchronously (face-to-face or online) with a total of twenty (20) contact hours. While the schedule is flexible, it is usually delivered in approximately ten (10) 2-hour modules/lectures/sessions.
The security topics include:
- Deriving IT-business security strategies
- Considerations for types of organizational structure, sourcing, governance (i.e., decision-making and decision rights), roles/responsibilities, and processes
- Impact of AI on security
- Leverage emerging security related technologies
- Understand the importance of information security in business continuity
- Critically analyze security threats and define appropriate technical and managerial controls for these threats
- Understand procedures for ensuring compliance with security policies and standards, establish appropriate systems and plans for security implementation
- Identify legal implications of security and standards for security management
- Recognize the management, organizational, and sourcing considerations for having an effective information security program
- Describe audit and recovery approaches for coping with security breaches
- Enhancing business-IT alignment