Companies Home Search Profile

Building and Managing a Cybersecurity Program

Focused View

Kip Boyle

1:44:18

186 View
  • 01 - Protect against cyberattacks.mp4
    00:51
  • 02 - What you should know.mp4
    00:59
  • 01 - What is information security.mp4
    02:14
  • 02 - Cybersecurity overview.mp4
    01:56
  • 03 - Cyber resilience overview.mp4
    04:18
  • 04 - Risk management overview.mp4
    03:48
  • 05 - Challenge Prepare and recover.mp4
    01:10
  • 06 - Solution Prepare and recover.mp4
    02:07
  • 01 - Achieve your customers expectations.mp4
    04:29
  • 02 - Cyberattack and failure resilience.mp4
    05:28
  • 03 - Compliance with laws and regulations.mp4
    04:53
  • 04 - Executive and BOD support.mp4
    05:26
  • 05 - Challenge Customer security requirements.mp4
    00:53
  • 06 - Solution Customer security requirements.mp4
    00:58
  • 01 - Essential functions of a program.mp4
    04:50
  • 02 - Determine your role.mp4
    04:46
  • 03 - Build a team.mp4
    05:35
  • 04 - The need for management.mp4
    02:13
  • 05 - The need for leadership.mp4
    05:12
  • 06 - Challenge Core competencies.mp4
    01:16
  • 07 - Solution Core competencies.mp4
    01:56
  • 01 - Sources of controls.mp4
    07:01
  • 02 - Organize around cyber resilience.mp4
    02:27
  • 03 - Information security program design.mp4
    05:51
  • 04 - Challenge Customer requirements.mp4
    01:27
  • 05 - Solution Customer requirements.mp4
    01:36
  • 01 - Communicate with executives.mp4
    04:09
  • 02 - Communicate with stakeholders.mp4
    03:19
  • 03 - Communicate with auditors.mp4
    03:33
  • 04 - Construct an annual program of work.mp4
    05:25
  • 05 - Challenge Optimize a cybersecurity program.mp4
    01:23
  • 06 - Solution Optimize a cybersecurity program.mp4
    02:00
  • 01 - Next steps for cybersecurity programs.mp4
    00:49
  • Description


    Building and managing a cybersecurity program is not for the faint of heart! The landscape is vast, complex, uncertain, and downright weird. After all, who else’s job is it to think of all the ways your organization can digitally fail and describe them in a business-friendly way? In this course—the first in a two-part series—instructor Kip Boyle guides you through the entire program construction process, including team building, program management workflow, and demonstrating compliance and progress. Check out the second course in this series, Measuring and Managing Top Cyber Risks, to take a more focused look at how to systematically assess and mitigate threats.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    I’ve been working in cybersecurity since 1992. I started as an air force officer, leading information technology teams. My assignments had us handling very sensitive information related to air-to-air weapons testing, so we were expected to practice what I now call “good cyber hygiene”. My most challenging job during this time was director of wide area network security for the F-22 “Raptor”. At the time, we were getting ready for the first production jets to come down the assembly line. It was very exciting! After the USAF, as a project leader at Stanford Research (SRI), I helped many Fortune 100 firms grapple with cybersecurity on a large scale. The problems they were dealing with were often 5 years or more ahead of the mainstream. So, there were no “off-the-shelf” solutions and many of our customers didn’t even know where to start. With no one else to turn to, they would come to us. Fast forward a few years and I was selected to be Chief Information Security Officer (CISO) of an insurance company. They owned a few subsidiaries, so I was also providing cybersecurity leadership to senior decision-makers of a community bank, credit union, debit/credit card transaction processor, and an IT managed service provider. I learned a lot about the business value of cybersecurity during those years. Then, in June of 2015, I launched my own company, Cyber Risk Opportunities. These days, cyberattacks are hurting businesses, even bankrupting them. That's wrong! We help executives manage cyber as the business risk it has become. So they’ll be ready no matter what happens. Setting priorities is a big goal in our work. Today, we have a lot of customers. Right now, we’re helping both a professional basketball team and a biotech company optimize their cyber risk management programs. It’s great to be able to use the same approach to help organizations that are so different in just about every obvious way. But, just under the surface, they are both very similar in terms of the cyber risk practices they need to follow. My mission is to enable executives to become more proficient cyber risk managers. Our customers include the U.S. Federal Reserve Bank, Boeing, Visa, Intuit, Mitsubishi, DuPont, and many others. And, because so many organizations in the US need better cyber risk management at the executive level, we’ve launched a partnership program so other professionals in positions of trust, such as lawyers and technology service providers, can use our tools and methods to help their existing customers thrive as cyber risk managers. Ask me about it!
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 33
    • duration 1:44:18
    • English subtitles has
    • Release Date 2023/07/01

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Cyber Security Awareness