Request for Information


February 17, 2022


USD $2,800


Four weeks
  • null


    This program is offered in English

Course Format

Live Digital


Phil Stupak, JD,
Mitigating Cyber Risk in Governance, the University of Chicago

Mitigating Cyber Risk in Governance

This course will provide you with frameworks to understand the current cybersecurity landscape while helping you define your role and address your concerns as a professional in charge of safeguarding critical infrastructure, assets, and the public. You will finish the course with a practicable plan to implement cybersecurity measures at your organization.

You will gain insight into the events and activities that influence how organizations create and implement cybersecurity policies in an increasingly dynamic global community. You will also learn how to implement cost-effective, mission-based cybersecurity, deploy your organization’s resources to effectively address cyber vulnerabilities, and build and maintain a robust cyber workforce.

Request for Information

Are You a Professional Interested in Developing Cybersecurity Defense Strategies?

This course is designed for professionals who wish to learn more about the impact of cyberattacks in both the private and public sectors and how to apply protective solutions directly to their organization.

Meet the Instructor

Phil Stupak, JD
Mitigating Cyber Risk in Governance, the University of Chicago

View More

Phil Stupak is currently a senior advisor at Cambridge Global, where he delivers best practices, protocols, and strategies around cybersecurity policy development and threat mitigation. He is also the associate director at the University of Chicago’s Harris Cyber Policy Initiative, a responsibility that entails managing both its programs and people. In September 2020, he was named adjunct lecturer for the University of Chicago’s Master of Science in Threat and Response Management. During the Obama administration he served as senior advisor to the Department of Homeland Security, where he handled cybersecurity, technology research and development, national security, and international relations portfolios. Stupak has a BA from the University of California, Berkeley and a JD from the University of Richmond.

Career Outlook

“Data is the new oil,” said mathematician Clive Humby fifteen years ago. Since then, the total amount of data in the world has increased seventy-four times, and it will keep rising. IDC predicts that the data universe will consist of 175 zettabytes by 2025. To give you an idea of the magnitude, if you were to download 175 zettabytes of data on your computer, it would take you 1.8 billion years. This massive swarm of data comes with a downside—the growing number of hacking incidents and security breaches. That is why the cybersecurity market value is projected to total 345.4 billion dollars by 2026. Business leaders realize the need to acquire cyber strategies, and so do governments, as they allocate funds to modernize and make their often vulnerable IT infrastructures more robust.


The average annual salary of a security analyst in the US


The percentage of senior IT employees and security leaders who believe their companies lack sufficient protection against cyberattacks

Potential Roles for Mitigating Cyber Risk in Governance

  • Chief Information Security Officer
  • Cryptanalyst
  • Cryptographer
  • Security Administrator
  • Security Analyst
  • Security Architect
  • Security Consultant
  • Security Engineer
  • Security Software Developer