Cybersecurity for the Business Executive

June 26, 2017 - 8 a.m. - 5 p.m.

Are you concerned with the media reports of increasing data breaches and the potential impact of a cyber incident to your business? If your expertise is in management and not technology, then this is the course for you. This course provides students with basic knowledge of information security topics as they relate to management of small to medium sized businesses. This course features a non-technical discussion of recent cybersecurity incidents, effective threat assessment, protection and response strategies and includes actionable takeaways.

Post-graduate work experience is highly meaningful but not necessary. A good understanding of key business drivers is critical to effective class participation. No technical knowledge or expertise is required.

By the end of the course, students will have been introduced to the following topics:


Mary Dickerson | Bio (PDF)
Phone number: 832-842-4679

No textbooks are required. All course materials will be provided by Instructor in class and include:


Monday, June 26, 2017: Morning Agenda
Topics Key Takeaways In Class Assignment

Putting IT in Context

IT Basics, Evolution & Future

Exercise: The future is now?

Business Impacts of IT

How does IT/IT Security impact business strategies/operations?

What are the opportunities to leverage IT Security activities to add value/competitive advantage?

Exercise: What does "disaster" look like?

Special Compliance Areas

What industries have special federal/industry compliance requirements?

What is PCI & HIPAA and why should you care?


Cybersecurity in the News

Examples of recent cybersecurity events

How can you assess the risk of currently reported threats on your business?

Exercise: Data Breach Article Analysis

Cybersecurity Risk Factors for All Businesses

What are 6 of the most common types of cyberattacks?

What are effective strategies for protecting against common attacks?


Incident Response and Business Continuity Plans

What do I do when my business has a security incident?

What are the elements of an effective incident response plan?

How do I integrate cyber incident response in business continuity plans?


Monday, June 26, 2017: Afternoon Agenda
Topics Key Takeaways In Class Assignment

Information Security Program Essentials

What are the 5 core components of an effective information security program?


Where do I start? Risk assessments, Resources and Low/No Cost Security Strategies

How do I do a basic risk assessment?

What is Cyber-risk Insurance?

What resources are available for my business to leverage?

What can I do for little to no cost to improve the security posture of my business?

Exercise: GHP NIST Cybersecurity Protection Assessment

Communication Strategies for Increasing Information Security Awareness

What does the Board of Directors need/want to know about Cybersecurity?

How do I engage management and employees in information initiatives?

What do I want my customers to know about my company's information security efforts?


Course Wrap-up and Overall Takeaways


Class Discussion & Certificates


Open Enrollment Programs | Custom Programs | Comprehensive Leadership Programs | Faculty | Partners | LinkedIn | Facebook | Twitter | Newsletter | Brochure | Polices

CONTACT US: Gary Randazzo, Director:, 713-743-4754 | Brittney Edwards, Program Coordinator: 713-743-4702