A NEW LIVE DIGITAL COURSE
Request for Information
Mitigating Cyber Risk in Governance
This course will provide you with frameworks to understand the current cybersecurity landscape while helping you define your role and address your concerns as a professional in charge of safeguarding critical infrastructure, assets, and the public. You will finish the course with a practicable plan to implement cybersecurity measures at your organization.
You will gain insight into the events and activities that influence how organizations create and implement cybersecurity policies in an increasingly dynamic global community. You will also learn how to implement cost-effective, mission-based cybersecurity, deploy your organization’s resources to effectively address cyber vulnerabilities, and build and maintain a robust cyber workforce.
Request for Information
Are You a Professional Interested in Developing Cybersecurity Defense Strategies?
This course is designed for professionals who wish to learn more about the impact of cyberattacks in both the private and public sectors and how to apply protective solutions directly to their organization.
Meet the Instructor
Phil Stupak, JD
Mitigating Cyber Risk in Governance, the University of Chicago
“Data is the new oil,” said mathematician Clive Humby fifteen years ago. Since then, the total amount of data in the world has increased seventy-four times, and it will keep rising. IDC predicts that the data universe will consist of 175 zettabytes by 2025. To give you an idea of the magnitude, if you were to download 175 zettabytes of data on your computer, it would take you 1.8 billion years. This massive swarm of data comes with a downside—the growing number of hacking incidents and security breaches. That is why the cybersecurity market value is projected to total 345.4 billion dollars by 2026. Business leaders realize the need to acquire cyber strategies, and so do governments, as they allocate funds to modernize and make their often vulnerable IT infrastructures more robust.
The percentage of senior IT employees and security leaders who believe their companies lack sufficient protection against cyberattacks
Potential Roles for Mitigating Cyber Risk in Governance
- Chief Information Security Officer
- Security Administrator
- Security Analyst
- Security Architect
- Security Consultant
- Security Engineer
- Security Software Developer