Data Integrity and Security

Managing Cyber Risk

Course Overview
Managing Cyber Risk is the second part of a two course series training program that assists senior executives and board members with better understanding how to understand and manage an organization’s cyber risk. This course provides an overview of cyber risk dashboards to help organizations successfully monitor and manage its cyber risk, and some best practices for creating and implementing a dashboard. This course also covers best practice recommendations and considerations to reduce cyber risk via policy and controls implementation across four broad categories: people, process, technology, and environment.

Despite the best defenses and preparation, the changes of an organization falling victim to a major cyber incident remain a reality. To address this reality, this course also details how an organization should react in the event of a data breach. It lays out broad recommendations on how to implement and execute against your incident response plan, crisis communications plans, and business continuity plans. The course highlights additional actions that help organizations manage longer-term post-breach impacts, from notifying stakeholders to conducting forensic investigations and determining post-incident lessons learned.

Learning Objectives:

After completing this course, participants should be able to:

  • Indicate how to strengthen the cyber workforce in your organization, including building a culture of cyber resiliency, identifying ways to better train and evaluate cyber security knowledge, and empowering cybersecurity leadership.
  • Specify the processes to measure and monitor cyber risk, including creating and implementing cyber risk dashboards and cybersecurity frameworks.
  • Recognize processes to manage cyber risk through establishment of response plans, audits and benchmarks, and purchase of cyber insurance.
  • Identify the key components of your technology ecosystem and prioritize your spending on cyber technology.
  • Recognize the benefits and importance of viewing your threat environment through organizational, industry, and geopolitical lenses and develop relationships with external resources--such as cyber threat intelligence, information sharing organizations, and law enforcement agencies--to monitor that environment.
  • Identify who in your organization is responsible for cybersecurity compliance and recognize the importance of relationships with regulators and law enforcement.

  • Define how your organization plans to detect, contain, remediate, and restore when dealing with the fallout from cyber incidents.
  • Specify how to notify stakeholders after an incident and how this fits into your broader incident response plan.
  • Specify how forensics investigations, legal defense, and audits are instrumental in the post-incident phase and the importance of conducting a thorough “lessons learned” after a cyber breach.

Content Partner:

CyberVista is a cybersecurity workforce development company. Through comprehensive training, organizations can better develop human capital, acquire the best talent, and prepare for evolving threats. CyberVista recognizes the challenges senior executives face in measuring and managing risk from cybersecurity scenarios in an enterprise context. Just like any other enterprise risk, corporate leaders need to prepare themselves to confront cyber issues and make informed business decisions. CyberVista is dedicated to providing cybersecurity training, education, and workforce development. Our mission is to arm organizations and individuals with the knowledge and skills they all need to defend against ever-evolving cyber threats. With parent Graham Holdings Company and sister company Kaplan, Inc., our innovative education technologies and personalized approach to learning offer a new vision for board, executive, and workforce cybersecurity education.

Prerequisites/Advanced Preparation:


Speaker / Author:

Jeffrey R. Welgan directs and oversees CyberVista’s Executive Training Programs, bringing a wealth of program management and threat intelligence experience to the CyberVista team. Jeff’s cyber expertise is rooted in all-source, strategic analysis of cyber threat actors, as well as nation-state cyber capabilities and doctrines. He led and managed a cyber threat intelligence capability at Booz Allen Hamilton, focusing primarily on specialized cyber threat studies for Fortune 100 commercial clients and for multiple government agencies, including the Defense Intelligence Agency, the Central Intelligence Agency, the National Security Agency, the Federal Bureau of Investigation, U.S. Cyber Command, U.S. Special Operations Command, the Department of the Treasury, and more.

Jeff previously served in the U.S. Navy both as an intelligence specialist and a search and rescue (SAR) swimmer. As an intelligence specialist, he managed and led a team of intelligence personnel through two deployments in support of Operations Enduring Freedom, Iraqi Freedom, and Noble Eagle. Jeff holds a B.A. in Political Science from Clarion University of Pennsylvania and an M.S. in Applied Intelligence from Mercyhurst University. He is also a certified Project Management Professional (PMP).


Price (USD)

Standard: $49.90


Course Code : CVFEI02

Release Date : 11/08/2019
Expire Date : 11/08/2021
Credits :
CPE 2.00
QAS 2.00

Course Level : Basic
Course Type : QAS Self-Study
Length : 1hr 40min
Passing Grade : 70%
Field Of Study : Information Technology

Format Type : eLearning
Mobile Compatible
Theme : Data Integrity and Security

Returning Subscribers

- OR -