Shopping Cart | Training Portal | Contact Us | 1-800-473-5181

Financial Management of Cyber Risk

Course Overview

Participants will learn the foundations of effective IT security as it relates to Financial Management. This course is designed to provide a unique opportunity to take a hard look at how to move your organization to a new era in producing business results, driven by investment in your cyber security program. Starting from a CFO perspective, this session will dig deeply into how IT drives your business and how managing cyber risk can be a significant, compelling and competitive advantage.

Course Outline

At the conclusion of the seminar, you will be able to:

  • Utilize a true risk management approach in regards to cyber risk.
  • Build transparency and accountability into your risk management approach.
  • Investigate and analyze emerging information technologies as they relate to data protection and security.
  • Identify the questions that you need to start asking today to understand if your business is getting the best return on its security investments.
  • Evaluate solutions needed to protect your data assets.
  • Summarize why and how to implement the security standards necessary to ensure compliance with government law and regulations.
  • Perform and apply best practices in IT risk management.
  • Integrate information assurance in a life cycle risk management framework.

 



Security Blog

Does your smartphone app discover all your accounts?

There’s a chill in the air, and it’s not just the normal fall morning breeze. In the era of NSA Prism/Xkeyscore/whatnext surveillance, and...

Ethical implications of whistle blowing

(ISC)2 code of ethics; Protect society, the commonwealth, and the infrastructure. Act honorably, honestly, justly, responsibly, and legally. Provide diligent and competent service to principals. Advance and protect...

The Great ATM Heist - is it really newsworthy?

On Friday, May 10, we saw many headlines about the latest great ATM bank robbery. Apparently these types of attacks are being regarded as...