Improve your cyber risk management skills. Learn the basics of cybersecurity and the top cyber risks affecting executives and their organizations.
Most executives want to be better cyber risk managers. They want to manage cybersecurity risks in the same thoughtful and intelligent way as they manage other aspects of their business. Fortunately, you don't need to be a technology expert to improve your cyber risk management skills. This course provides practical, to-the-point training for the busy executive, in everyday language, complete with examples that are easy to understand. Instructor Kip Boyle describes the big picture events driving cybercrimes today and the top cyber risks affecting executives and their organizations. He provide examples of common cyberattacks, including actual impacts to real organizations. He uses germ theory to explain how good "security hygiene" can help you and your organization combat security threats, and introduces the top actions executives can take to avoid threats such as phishing, identity theft, hacking, and financial fraud. Plus, learn how contract "firewalls" and third-party cyber risk management can help you mitigate the most common cyber risks.
Cybersecurity for executives
What you should know
How this course is organized
1. Understand the Big Picture
Understand the big picture overview
Why are you a target?
Example: Organized crime
Why are you in the line of fire?
Example: Cyberwar cross-fire
Insider threat: Cyber failure
2. How to Think about Cybersecurity
Think about cybersecurity summary
Not what you buy, how you travel
Where to get IT support
3. Avoid Phishing Attacks
Avoid phishing attacks summary
What are phishing attacks?
How to avoid phishing attacks
Organizational response to phishing attacks
4. Stop Malicious Code
Stop malicious code summary
What is malicious code?
How to avoid malicious code
Organizational response to malicious code
5. Avoid Identity Theft
Avoid identity theft summary
What is identity theft?
How to avoid identity theft
Organizational response to identity theft
6. Avoid Financial Cybertheft
Avoid financial cybertheft summary
What is financial cybertheft?
How to avoid financial cybertheft
Organizational response to financial cybertheft
7. Avoid Cyberattacks on Long Trips
Avoid cyberattacks summary
What are cyberattacks on long trips?
How to avoid cyberattacks on long trips
Organizational response to cyberattacks on long trips