Loading...

Course Description

The integrity of data systems and operations is at constant risk from potential vulnerabilities, threats, and attacks. In this course, you will examine how these risks can occur within your organization as well as originate from external sources. You will discover how to anticipate bad actors that threaten your cybersecurity and explore strategies for identifying, reviewing, and implementing best practices to safeguard the security of your operations. You will also hear the insights of a cybersecurity expert who helps organizations adapt their businesses to changing operational needs. This course equips you to anticipate the cybersecurity-related issues, potential business risks, and consequences facing your organization, then manage these issues under the applicable regulatory and policy regimes.

You are required to have completed the following courses or have equivalent experience before taking this course:

  • Privacy Structure and Risk Assessment
  • Privacy Incidents
  • Examining Cybersecurity Governance

Faculty Author

Leonard Kennedy

Benefits to the Learner

  • Explore how third-party actions as well as your own can impede business objectives
  • Anticipate changes in an ever-evolving system of operational security practices and prepare to adapt accordingly

Target Audience

  • IT professionals
  • Marketing professionals
  • Managers and executives
  • Product development professionals
  • Data scientists
  • Professionals responsible for cybersecurity and privacy-related concerns
  • HR professionals
  • Legal professionals

Applies Towards the Following Certificates

Loading...
Cornell Law School
Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .