About this courseAdvancements in technology have raised the level of acknowledgement of threats in the cyber age. These threats touch both the business world and personal lives. Information technology is no longer a “back-office” function. Once considered a process area that was solely part of the Chief Information Officer’s domain, companies must now acknowledge that whether the threats are internal or external, they are very real and can and will cause harm to many organizations in many ways. As a result, it is imperative that professionals across the company understand and be prepared to deal with the multitude of ever-growing cyber threats.
Outside of being aware, organizations must begin to implement cyber risk management programs.This includes strategic risk assessments that evaluate aspects of your organization’s cyber presence. This segment focuses on components and roles for a cyber program.
Future segments will focus on building a cyber security risk assessment and dissecting the steps of the National Institute of Standards and Technology (NIST) cyber risk framework.
Field of Study: Information Technology
This course includes:
schedule2 hours on-demand video
signal_cellular_altBeginner level
task_altNo preparation required
calendar_todayPublished At Jan 11, 2022
workspace_premiumCertificate of completion
calendar_todayUpdated At Aug 8, 2024