Advanced Cyber Exposure - Part 2 – Cyber Exposure Program Management
Provides you with a reliable framework to help you manage your cyber exposures - now and in the future.
Why Is This Course
In this course we will provide guidelines on how you can manage your cyber exposures. We say guidelines since every cyber eco-system is unique and continually undergoing change from business processes, technology and business partners requirements.
So a static one size fits all approach is not going to work. Instead we will provide you with techniques and approaches to measure, prioritize, and manage your cyber exposures. You will come to appreciate the need for triage and contingency planning as well. So if you are ready to begin to manage all the cyber exposures you have uncovered take this course. Now!
About This Course
This course is the third of the series of three courses. The first course - Understanding Cyber Exposure provided an overview of cyber exposure and how to address it. The second - Advanced Cyber Exposure Management - Part 1 - Identification examined in depth how to identify your cyber exposures.
This course will provide you a guidance on how to manage the cyber exposures you have identified.
These and many others can create cyber vulnerabilities for the organization that go unrecognized until they create major problems. By taking this course you will gain an awareness of the wide range of exposures that exist and how to identify and manage them.
The course is broken into 7 modules each less than 10 minutes in duration to allow it to fit into busy schedules.
At the end of the course there is a quiz that will let you know if you understood the concepts presented.
By the completion of thus course you will be able to lead and conduct the Cyber program management for your organization, including triage and contingency planning.
Upon successful completion of all quizzes and exercises you will get a Certificate of Completion from Global Risk Academy
Who This Course Is For?
The course is designed for all who have an interest, or concern, regarding cyber threats to gain a broader view and understand that cyber threats are not just a technical issue. These are not courses in how to best create firewalls.
- C level executives could certainly gain in having a broader understanding of the threats their organization faces.
- IT managers and staff would gain an understanding of the wide range of threats their organizations face and the need to reach across the organization to communicate and assist.
- Cyber threat practitioners can gain by having additional information that will assist their efforts in gaining support and resources.
- If you are responsible, at least in part, for implementing and operating an organizations cyber threat program, this course is for you.
Limited Bonus - 6-month Complimentary access to an Advanced Risk Tool
100 first students who join the course will get a 6-month Complimentary access to RISKID, the innovative Collaborative Risk Management software. The main reason of this limit is that we don't want to overwhelm the support team.
RISKID is a risk assessment tool for organizations and projects that allows full support in identifying, analyzing and assessing risks.
RISKID offers the possibility to monitor the risk analysis process and periodically make adjustments based on the latest developments and insights.
So you can start implementing your theoretical knowledge gained during your study of the course material in the practice, creating actual assessments, analyzing and monitoring your risks.
The clients include such large and diverse customers like Arcadis, ProRail, Erazmus University and more.
RISKID is very flexible. It can be configured to support various risk management standards, such as ISO 31000, RISMAN, COSO, INK-model, FMEA, HSSE, PRINCE2 or Solvency II.
Bonus #2: The Cyber Exposure Awareness Survey - to help you get a quick read on how aware your organization is of their cyber exposure.
Take your first steps in understanding your organization's cyber exposure awareness. Answer eight multiple choice questions and your responses will trigger immediate feedback. At the conclusion, we will provide you with an estimate of the level of your cyber exposure awareness based on your answers.
Additional Feature #1: Course Software That Keeps You On Track
The course software is very easy to use. It tracks your progress for you, allowing you to come back right where you left off. This keeps you organized and helps you focus your time on learning.
You can access the course anytime, from any device. Watch the presentations,videos and downloadable materials on any tablet or smartphone.
Additional Feature #2: Comments Section on Every Page
Your Satisfaction Is Guaranteed
Our goal is to help you become a better Risk Manager so you can take your career to the next level.
I want you to use this course as a resource for continued learning. If you take the course and are not satisfied with what you learned, you can get a full refund.
Your satisfaction is guaranteed by our 100% money-back guarantee refund policy.
Doug Nagan has over fifty years experience in computer and information technology. Currently he is working with clients on projects involving business and IT strategic issues. He most recently created, with a Philadelphia law firm, Kleinbard LLC, a family of cyber risk exposure management protocols.
The protocols, Frigate for general business use, and Summa for higher educational institutions, provide a strategic overview of organizations' cyber risk exposures with recommendation for appropriate actions to address the potential risks.
Doug has assisted clients, including the U.S. Air Force, assess risks in manufacturing, finance, IT and supply chains. Results have included direct savings of over $100 million and the avoidance of potential risks of equivalent value through assessment of existing operational and implementing suggested improvements.
His experience includes: business analysis, business continuity, information technology, merger consolidation, operations and process improvement, project and program management, risk assessment and management, and sourcing strategy. Clients range from start-ups to Global 25 corporations across eight industries.
Doug founded Nagan Research Group in 2009 to pursue research in cyber risk. In 1992, Doug founded and led International Resource Management, Inc. for 16 years to provide high level strategic guidance to corporate clients and to pursue the development of several technologies that he had invented. He currently holds U.S. Patent 5,818,400 for a new display technology.
Prior to 1992, Doug held executive positions in John Wiley & Sons, The Boston Company and Commercial Union.
Education: BS in Electrical Engineering – Lafayette College
MBA course work – New York University
Life Member IEEE and The Computer Society
Publications: eERM – effective Enterprise Risk Management 2011 ISBN 978-1460980446; eCEM –effective Cyber Exposure Management 2012 ISBN 978-1478183785; The Case for a National Preparedness Standard and Metric, presented at the IEEE-HST conference in May 2007
"The course was very useful and I have a much better and clearer understanding of cyber risk exposure. It is well presented and hits all the right notes. A good framework which I will be incorporating into our bank branch in Australia"
- Vijay Poobathy, Risk & Compliance Office, Australia