Companies Home Search Profile

Cybersecurity for Executives

Focused View

Kip Boyle

1:20:21

137 View
  • 01 - You are a target and the first line of defense.mp4
    01:54
  • 01 - Understand the big picture overview.mp4
    01:27
  • 02 - Why are you a target.mp4
    02:08
  • 03 - Example Organized crime.mp4
    03:10
  • 04 - Why are you in the line of fire.mp4
    02:42
  • 05 - Example Cyber war cross-fire.mp4
    01:52
  • 06 - Insider threat Cyber failure.mp4
    02:45
  • 01 - Think about cybersecurity summary.mp4
    01:03
  • 02 - Not what you buy, how you travel.mp4
    03:06
  • 03 - Germ theory.mp4
    01:28
  • 04 - Where to get IT support.mp4
    01:50
  • 01 - Avoid phishing attacks summary.mp4
    01:05
  • 02 - What are phishing attacks.mp4
    02:29
  • 03 - Organizational response to phishing attacks.mp4
    03:08
  • 01 - Stop malicious code summary.mp4
    00:45
  • 02 - What is malicious code.mp4
    02:50
  • 03 - Organizational response to malicious code.mp4
    02:47
  • 01 - Avoid identity theft summary.mp4
    00:35
  • 02 - What is identity theft.mp4
    02:42
  • 03 - Organizational response to identity theft.mp4
    03:45
  • 01 - Avoid financial cyber theft summary.mp4
    00:34
  • 02 - What is financial cyber theft.mp4
    03:40
  • 03 - Organizational response to financial cyber theft.mp4
    03:46
  • 01 - Special topics summary.mp4
    01:56
  • 02 - Reasonable cybersecurity.mp4
    02:33
  • 03 - Cyber insurance.mp4
    03:30
  • 04 - Cloud computing.mp4
    03:24
  • 05 - Internet of Things.mp4
    02:54
  • 06 - Contractual firewalls.mp4
    03:46
  • 07 - Third-party cyber risk management.mp4
    03:00
  • 08 - Cybersecurity-related sales objectives.mp4
    03:14
  • 09 - Active defense.mp4
    03:10
  • 01 - Next steps.mp4
    01:23
  • Description


    Most executives want to be better cyber risk managers. They want to manage cybersecurity risks in the same thoughtful and intelligent way as they manage other aspects of their business. Fortunately, you don't need to be a technology expert to improve your cyber risk management skills. This course provides practical, to-the-point training for the busy executive, in everyday language, complete with examples that are easy to understand. Instructor Kip Boyle describes the big picture events driving cybercrimes today and the top cyber risks affecting executives and their organizations. He provides examples of common cyberattacks, including actual impacts to real organizations. He uses germ theory to explain how good "security hygiene" can help you and your organization combat security threats, and introduces the top actions executives can take to avoid threats such as phishing, identity theft, hacking, and financial fraud. Plus, learn how contract "firewalls" and third-party cyber risk management can help you mitigate the most common cyber risks.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    I’ve been working in cybersecurity since 1992. I started as an air force officer, leading information technology teams. My assignments had us handling very sensitive information related to air-to-air weapons testing, so we were expected to practice what I now call “good cyber hygiene”. My most challenging job during this time was director of wide area network security for the F-22 “Raptor”. At the time, we were getting ready for the first production jets to come down the assembly line. It was very exciting! After the USAF, as a project leader at Stanford Research (SRI), I helped many Fortune 100 firms grapple with cybersecurity on a large scale. The problems they were dealing with were often 5 years or more ahead of the mainstream. So, there were no “off-the-shelf” solutions and many of our customers didn’t even know where to start. With no one else to turn to, they would come to us. Fast forward a few years and I was selected to be Chief Information Security Officer (CISO) of an insurance company. They owned a few subsidiaries, so I was also providing cybersecurity leadership to senior decision-makers of a community bank, credit union, debit/credit card transaction processor, and an IT managed service provider. I learned a lot about the business value of cybersecurity during those years. Then, in June of 2015, I launched my own company, Cyber Risk Opportunities. These days, cyberattacks are hurting businesses, even bankrupting them. That's wrong! We help executives manage cyber as the business risk it has become. So they’ll be ready no matter what happens. Setting priorities is a big goal in our work. Today, we have a lot of customers. Right now, we’re helping both a professional basketball team and a biotech company optimize their cyber risk management programs. It’s great to be able to use the same approach to help organizations that are so different in just about every obvious way. But, just under the surface, they are both very similar in terms of the cyber risk practices they need to follow. My mission is to enable executives to become more proficient cyber risk managers. Our customers include the U.S. Federal Reserve Bank, Boeing, Visa, Intuit, Mitsubishi, DuPont, and many others. And, because so many organizations in the US need better cyber risk management at the executive level, we’ve launched a partnership program so other professionals in positions of trust, such as lawyers and technology service providers, can use our tools and methods to help their existing customers thrive as cyber risk managers. Ask me about it!
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 33
    • duration 1:20:21
    • Release Date 2023/01/04