Required Course Details

The Cybersecurity & Regulation Landscape (DCRS-01)

This course provides a high-level overview of the current cybersecurity risk landscape, current regulatory environment in key jurisdictions around the world, and explains the role of the board and senior management team in cyber risk oversight.

At the conclusion of this course, you will be able to:

  • Understand the current cyber risk landscape
  • Gain insight into the current regulatory environment in key jurisdictions around the world
  • Explain the role of the board and senior management team in cyber risk oversight
Sandy Garfinkel, Co-chair of the Privacy & Data Security Group, McNees Wallace & Nurick LLC
Co-chair of the Privacy & Data Security Group, McNees Wallace & Nurick LLC
Masha Sedova, Co-founder & President, Elevate Security
Co-founder & President, Elevate Security
Marianne Bailey
Partner, Cybersecurity Lead, Guidehouse

Cyber Risk Management (DCRS-02)

This course is designed to help leaders to better understand their cyber risk exposure and responsibilities. This includes an overview of cyber risk management assessments and frameworks including NIST, integrated risk management, and enterprise risk management. This is then translated into an effective cyber risk management strategy including common technical tools and controls.

At the conclusion of this course, you will be able to:

  • Understand the concepts of cyber risk assessments and cyber risk management
  • Identify key risk management frameworks as they pertain to cybersecurity
  • Describe the importance of controls, security architecture and engineering when considering the strategy for cyber risk management
Jessica Hebenstreit, Founder and CEO, Secitup Consulting
Founder and CEO, Secitup Consulting
Anthony Johnson, Managing Partner, Delve Risk
Managing Partner, Delve Risk
Maria Roat, CEO, MA Roat Consulting LLC
CEO, MA Roat Consulting LLC

Cyber Strategy & Board Oversight (DCRS-03)

Explore the strategy and upside of cyber and digital including a review of emerging technologies such as blockchain and AI, security architecture and technical tools to support effective governance. Learners will also consider the board’s relationship with management and oversight structures relating to cyber risk.

At the conclusion of this course, you will be able to:

  • Understand how best to oversee digital and cyber strategy
  • Identify various emerging technologies and the associated opportunities and risks to business
  • Understand the board’s relationship with management pertaining to cybersecurity risk oversight
  • Identify board and board committee responsibilities for cyber risk oversight
Anthony Johnson, Managing Partner, Delve Risk
Managing Partner, Delve Risk
Peter D. Weill
Senior Research Scientist and Chairman Emeritus, MIT CISR
Myrna Soto, CEO, Apogee Executive Advisors
CEO, Apogee Executive Advisors
Dean Sysman
CEO and Co-founder, Axonius
Fellow, Stanford

Cyber Incidents (DCRS-04)

This course explores the key tools, policies and procedures outlined in a cybersecurity program that come to life during a major cyber incident. Learn about effective tools for responding to a major cyber incident and begin to consider how you would respond to an incident.

At the conclusion of this course, you will be able to:

  • Identify the key components of a mature cybersecurity program
  • Recognize the key tools and procedures essential to responding to a major cyber incident
  • Understand different levers to pull when responding to an incident
Renee Wynn, Former CIO Nasa, RP Wynn Consulting LLC
Former CIO NASA, RP Wynn Consulting LLC
Sandy Garfinkel, Co-chair of the Privacy & Data Security Group, McNees Wallace & Nurick LLC
Co-chair of the Privacy & Data Security Group, McNees Wallace & Nurick LLC
Maria Roat, CEO, MA Roat Consulting LLC
CEO, MA Roat Consulting LLC
Marianne Bailey
Partner, Cybersecurity Lead, Guidehouse
Jeff Birnbach, Senior Partner, Managing Director, Sylint
Senior Partner, Managing Director, Sylint
Serge Jorgensen, CTO, Sylint
CTO, Sylint

Simulated Tabletop Exercise (DCRS-TABLETOP)

This course is designed to put your learning into practice as you participate in a simulated tabletop exercise of a cyberattack.

At the conclusion of this course, you will be able to:

  • Understand how to work with the incident response team during a cyber incident
  • Recognize your role in responding guiding a company in responding to a cyberattack
  • Consider how you would respond in a real world scenario