About this course

The goal of cybersecurity is to identify cyber risks and reduce them to an acceptable level. From a strategic view, an organization’s cybersecurity program and cyber risk management has to fulfill five core functions. There have to be processes to identify cyber risks, a deployment of safeguards and detection capabilities, as well as organizational and technical measures to respond and recover from a cyber incident. This course covers the relevant standards, frameworks and best practices to establish a cyber risk management program from a technical, governance, and legal perspective. The lecture is accompanied by a semester-long case study, where you identify and evaluate the cyber risk for an organization, and develop a customized cybersecurity program to treat them.



Course Content

These topics are covered in cyber security management:

Identify

  • Security governance and risk management standards (i.a. ISO31000 series)
  • Threat identification, cyber threat intelligence and cyber attack analysis models
  • Information Security Management Systems (i.a. ISO27000 series)
  • Compliance standards and frameworks
  • Risk management frameworks specific to critical infrastructures and select sectors

Protect

  • Categorization of controls (technical and non-technical; preventive, detective and responsive controls)
  • Security standards (i.a. BSI Grundschutz)
  • Security architectures and best practices (least privileges, defense in depth, security by design)
  • Physical security, asset and identity management
  • Security awareness

Detect

  • Logging and monitoring systems
  • Security assessment and metrics
  • Cyber threat intelligence
  • Penetration testing

Respond

  • Vulnerability management
  • Triage and threat analysis
  • Intelligence-driven incident response

Recover

  • Business continuity planning
  • Disaster recovery
  • Crisis management and communication



Semester Schedule

The course is/was offered in these terms: