Understanding Cyber Exposure

Provides you with a framework and understanding of the wide range of cyber exposures as well as awareness of some tools to address and manage them.

About This Course

Cyber Exposure is defined as the vulnerabilities created when we use computer and network technology. All too often the focus is strictly on the technical issues and exposures arising from the use of Social Media or the Internet of Things (IoT) are ignored.

These and many others can create cyber vulnerabilities for the organization that go unrecognized until they create major problems. By taking this course you will gain an awareness of the wide range of exposures that exist and how to identify and manage them.

The course is broken into six modules each less than 10 minutes in duration to allow it to fit into busy schedules.

At the end of each module there is a 10 question quiz that will let you know if you understood the concepts presented.

By the end of the course you will have an understanding of the wide range of cyber exposures that can arise from the use of technology and networks as well as awareness of some tools to address and manage them.


Who This Course Is For?

The course is designed for all who have an interest, or concern, regarding cyber threats to gain a broader view and understand that cyber threats are not just a technical issue. This is not a course in how to best create firewalls.

  • Board members and C level executives could certainly gain in having a broader understanding of the threats their organization faces.
  • IT managers and staff would gain an understanding of the wide range of threats their organizations face and the need to reach across the organization to communicate and assist.
  • Cyber threat practitioners can gain by having additional information that will assist their efforts in gaining support and resources.

If you are concerned that your organization is approaching cyber threats in a comprehensive manner and not just playing cyber wack-a-mole, this course is for you.


New Update - May 2017

Self-Assessment of your organization’s cyber exposures

Take the first steps in understanding your organization's potential cyber exposure. Answer 12 multiple choice questions and you will get feedback using the scoring summary.

Self-Assessment of your personal cyber exposures

You want to know your cyber exposure. We can tell you it is probably more than you think and way more than you would like. The 10 questions each view a different aspect of your cyber behaviour so it won’t take long.


 

Your Instructor


Douglas A. Nagan
Douglas A. Nagan

Doug Nagan has over fifty years experience in computer and information technology. Currently he is working with clients on projects involving business and IT strategic issues. He most recently created, with a Philadelphia law firm, Kleinbard LLC, a family of cyber risk exposure management protocols.

The protocols, Frigate for general business use, and Summa for higher educational institutions, provide a strategic overview of organizations' cyber risk exposures with recommendation for appropriate actions to address the potential risks.

Doug has assisted clients, including the U.S. Air Force, assess risks in manufacturing, finance, IT and supply chains. Results have included direct savings of over $100 million and the avoidance of potential risks of equivalent value through assessment of existing operational and implementing suggested improvements.

His experience includes: business analysis, business continuity, information technology, merger consolidation, operations and process improvement, project and program management, risk assessment and management, and sourcing strategy. Clients range from start-ups to Global 25 corporations across eight industries.

Doug founded Nagan Research Group in 2009 to pursue research in cyber risk. In 1992, Doug founded and led International Resource Management, Inc. for 16 years to provide high level strategic guidance to corporate clients and to pursue the development of several technologies that he had invented. He currently holds U.S. Patent 5,818,400 for a new display technology.

Prior to 1992, Doug held executive positions in John Wiley & Sons, The Boston Company and Commercial Union.

Education: BS in Electrical Engineering – Lafayette College

MBA course work – New York University

Life Member IEEE and The Computer Society

Publications: eERM – effective Enterprise Risk Management 2011 ISBN 978-1460980446; eCEM –effective Cyber Exposure Management 2012 ISBN 978-1478183785; The Case for a National Preparedness Standard and Metric, presented at the IEEE-HST conference in May 2007


Recent Results

"The course was very useful and I have a much better and clearer understanding of cyber risk exposure. It is well presented and hits all the right notes. A good framework which I will be incorporating into our bank branch in Australia"

- Vijay Poobathy, Risk & Compliance Office, Australia

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
Once you join, you'll have lifetime access to a completely self-paced online course available on any device. You can decide what content you want to start with, when you'd like to start and when you'd like to finish. You will also get all future updates that we will regularly provide.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Get started now!