Cyber Security Management
About this course
The goal of cybersecurity is to identify cyber risks and reduce them to an acceptable level. From a strategic view, an organization’s cybersecurity program and cyber risk management has to fulfill five core functions. There have to be processes to identify cyber risks, a deployment of safeguards and detection capabilities, as well as organizational and technical measures to respond and recover from a cyber incident. This course covers the relevant standards, frameworks and best practices to establish a cyber risk management program from a technical, governance, and legal perspective. The lecture is accompanied by a semester-long case study, where you identify and evaluate the cyber risk for an organization, and develop a customized cybersecurity program to treat them.
Course Content
These topics are covered in cyber security management:Identify
- Security governance and risk management standards (i.a. ISO31000 series)
- Threat identification, cyber threat intelligence and cyber attack analysis models
- Information Security Management Systems (i.a. ISO27000 series)
- Compliance standards and frameworks
- Risk management frameworks specific to critical infrastructures and select sectors
Protect
- Categorization of controls (technical and non-technical; preventive, detective and responsive controls)
- Security standards (i.a. BSI Grundschutz)
- Security architectures and best practices (least privileges, defense in depth, security by design)
- Physical security, asset and identity management
- Security awareness
Detect
- Logging and monitoring systems
- Security assessment and metrics
- Cyber threat intelligence
- Penetration testing
Respond
- Vulnerability management
- Triage and threat analysis
- Intelligence-driven incident response
Recover
- Business continuity planning
- Disaster recovery
- Crisis management and communication