October 25 – November 5, 2021
Two Week Course | 4 Modules of Asynchronous Content | 4 one-hour Live Synchronous ZOOM Sessions
Registration Deadline: October 21, 2021
It seems like it’s happening almost every day. This is just one recent headline (BusinessInsider.com, June 12, 2021):
“Major cyberattacks have rocked the US, and there are ‘a lot of different ways that ransomware actors can disrupt everyone’s lives,’ experts say”An excerpt from the article:
“Cyberattacks can be categorized in three ways, Tyler Moore, a professor of cybersecurity and information at the University of Tulsa, told Insider. These include the headline-making attacks where criminals exploit systems seeking ransom, such as the attacks on JBS and Colonial Pipeline. Another type, he said, is an espionage attack where foreign criminals breach a system intending to steal information.
There’s also a third and more common type category called “email compromise,” where a hacker targets a business or organization using an email phishing scam. Business email compromise scams cost US companies a combined $1.8 billion last year, according to a March 2021 report from IC3, the FBI’s Internet Crime Complaint Center. There were 791,730 complaints of suspected internet crime in 2020, about 300,000 more than were reported in 2019. In total, these cyberattacks resulted in a loss of more than $4 billion in the US last year, according to the report.”
That’s the focus of this program instructed by Tyler Moore, Ph.D., University of Tulsa Tandy Professor of Cyber Security, Tandy School of Computer Science; Chairperson, School of Cyber Studies; Faculty Director, MS in Cyber Security Online at The University of Tulsa, 2016-17 New America Cybersecurity Fellow.FORMAT: Blended online course with asynchronous content (readings, videos, exercises, knowledge-check quizzes) in each module delivered and reviewed by the participants ahead of the live one-hour instructor-led Zoom sessions with discussion, hands-on activities and Q&A.Duration: 2 weeks. 4 one-hour live sessions. Participants are expected to follow the pace of the course and to be ready to participate in the live sessions with other participants.
Participant Reviews (Blended Online & F2F courses):
“The program provided me with more tools to communicate the benefits of cybersecurity investments in ways that our non-technical leadership can easily understand.” – Sr. Solutions Architect & Cyber Security Operations Center Lead, QuikTrip
“This program is a great crash course on cybersecurity and how companies view cybersecurity. Dr. Moore is an excellent instructor. Being able to learn from someone who has actually testified before congress on cybersecurity issues is both really cool and informative.” – Audit Supervisor, Continental Resources, Inc.
“Great class. Included excellent information on what to collect to determine risk in our environment.” – Security Engineer, QuikTrip Corporation
“Enjoyed the material & group discussion time.” – IT, Calyx Energy
“This course is excellent for both cyber security practitioners to help understand the business side of cyber security and instrumental for anyone tasked with convincing CSuite Execs to invest in security.” – CSOC Lead, QuikTrip Corporation
Participants will learn how to answer the question, “How much security is enough?”, using three different methodologies:
1. They will understand that when compliance regimes dictate investments, meeting those obligations could be enough.
2. They will understand how to apply security investment frameworks and identify ‘enough’ spending when the controls recommended by the framework are applied.
3. They will learn how to compute quantitative metrics which calculate return on security investment, as well as conduct cost-benefit analysis to determine when security investments bring more benefits than they cost, spending is ‘enough’.
But Most Importantly:
4. Participants will understand the advantages and disadvantages of each approach, and be comfortable using each to guide investment decisionS.
Who Should Attend:
Anyone who has the responsibility of protecting the security of a company’s IT infrastructure but does not have formal training in cybersecurity will benefit from attending.
- Chief Financial Officers
- IT Staff with security responsibilities but no formal training
- Those responsible for designing, implementing and overseeing cybersecurity operations
- Audit Supervisors
- System Architects
- Chief Information Security Officers
- Personnel with budgetary authority, or who must appeal to someone with budgetary authority, on IT investments
- Chief Information Officers
- Those who understand the technical aspects of security controls but need to have a broader perspective of how to build and implement a program
Tyler Moore, PhD
During this course, you will learn how to. . .
Course Date & Format:
Date: October 25-November 5, 2021
FORMAT: Blended online course with asynchronous content (readings, videos, exercises, knowledge-check quizzes) in each module delivered ahead of live instructor-led Zoom sessions with discussion, hands-on activities and Q&A.
Duration: 2 weeks. 4 live sessions. Participants are expected to follow the pace of the course and to be ready to participate in the live sessions with other participants.
* $1,295/person: BEST DEAL DISCOUNT: Deadline: Sept. 16, 2021
REGISTRATION DEADLINE: October 21, 2021
NOTE: This is a complete program. Participants are expected to review and participate in all 4 modules.
Module 1: Cybersecurity Threats
Instructor-Led Zoom Session | Tuesday,Oct. 26 | 12-1 pm CST
Module 2: An Economic Approach to Cybersecurity
Instructor-Led Zoom Session | Friday,Oct. 29 | 12-1 pm CST
Module 3: Security Metrics and Cost-Benefit Analysis
Instructor-Led Zoom Session | Tuesday,Nov. 2 | 12-1 pm CST
Module 4: Managing Cyber Risks
Instructor-Led Zoom Session | Friday. Nov. 5 | 12-1 pm CST
|MANAGING CYBERSECURITY RISKS
October 25 – November 5, 2021 | Registration Deadline: Oct. 21, 2021
|Company In-House Training
Contact us about an exclusive educational training experience for your group of 10 or more!
|In-Company Training Request Form|