Companies Home Search Profile

Building and Auditing a Cybersecurity Program

Focused View

Michael Ratemo

1:47:16

248 View
  • 01 - Cybersecurity simplified.mp4
    00:42
  • 02 - Creating the cybersecurity program framework.mp4
    01:29
  • 01 - Adopt security frameworks to drive cybersecurity governance.mp4
    05:08
  • 02 - Consider laws and regulations in cybersecurity governance.mp4
    04:13
  • 03 - Policies, standards, and procedures to govern cybersecurity.mp4
    05:31
  • 04 - Roles and responsibilities for cybersecurity governance.mp4
    04:56
  • 05 - Cyber risk management program for cybersecurity governance.mp4
    04:36
  • 06 - Risk management process to prioritize cyber defense.mp4
    06:06
  • 01 - Infrastructure asset management for cybersecurity.mp4
    03:57
  • 02 - Software asset management for cybersecurity.mp4
    03:53
  • 03 - Secure cyber supply chain to reduce risk of external threats.mp4
    05:18
  • 01 - Establish data security management practices to protect data.mp4
    05:03
  • 02 - Encryption to provide confidentiality of data.mp4
    05:58
  • 03 - Access management to control unauthorized access.mp4
    04:37
  • 04 - Vulnerability management to mitigate security weaknesses.mp4
    04:50
  • 05 - Secure configuration process to minimize vulnerabilities.mp4
    03:59
  • 01 - Network security monitoring to detect cyber threats.mp4
    05:34
  • 01 - Incident management to respond to a cyber attack.mp4
    04:17
  • 01 - Integrating cybersecurity into disaster recovery.mp4
    03:59
  • 02 - Data backups to defend against ransomware and cyber threats.mp4
    04:43
  • 01 - Application security to mitigate data breaches.mp4
    08:42
  • 02 - Cloud security to protect cloud data from threats.mp4
    08:11
  • 01 - Additional resources.mp4
    01:34
  • Description


    If your company has any online presence at all, it should go without saying that you need to devote resources to cybersecurity, as cyber attacks increase and ransomware becomes more commercialized. The goal of this course is to provide a comprehensive methodology with which anyone can use to assess any organization's cybersecurity program, whether you’re an IT or cybersecurity professional, executive, auditor, or a board of directors member. Join cybersecurity professional Michael Ratemo as he teaches you the key elements that make up a cybersecurity program, what to look for when reviewing the various elements, and how to evaluate the effectiveness of the program. Whether you need to build a cybersecurity program from scratch, or understand the state of your organization’s current cybersecurity measures, this course provides valuable information to help you secure your data.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Michael Ratemo
    Michael Ratemo
    Instructor's Courses
    Business-focused information security leader who speaks security in the language business can understand. A distinguished career building effective security strategies that are customized to protect organizations. Skilled in elevating effectiveness of organizations security programs - in driving business value, and mitigating risks across large and complex environments. Strength in assessing, defining, advocating, and driving the adoption of risk management strategies, controls, and models that have enabled organizations to comply with evolving regulatory requirements, advance cybersecurity, strengthen resiliency of computing ecosystems, and achieve cultural transformations. Core Competencies _____________________ • Security Strategy • Cloud Security • Application Security • Threat Modeling • Cyber Risk Assessment • Governance, Risk & Compliance • Security Policy Development • Cyber Security metrics and Program Maturity • Security Architecture • Threat & Vulnerability Management • Security Awareness • Cyber Business Resiliency & Continuity Planning
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 23
    • duration 1:47:16
    • Release Date 2023/01/03