Cyber security for Digital Leadership
Gain the knowledge and confidence to leverage Artificial Intelligence for competitive advantage
100% live lectures by faculty from top global schools
Integrated group work on real world projects
Record of participation from UCLA extension
Request your brochure
4 weeks (Live Virtual)
About the Program
In today’s Information Age, as business, governments, Public Sector Units, financial institutions, and individuals converge on the digital market space, generation, collection, processing, storage, and data exchange has become an integral part of digital transaction and interactions. In parallel, cyber security threats and cyber-attacks by hackers exploiting vulnerabilities of an organization’s cyber security is a common phenomenon. As a result, cyber risk management has become a fundamental component of business operations and understanding and mitigating risk has become an essential skill for business leaders, thought leaders, analysts, as well as security and technology specialists
COVID-19 had made the world far more connected. While multiple entities are interacting on the digital channels, they are far more vulnerable to cyber risk. The demands on organization infrastructure to withstand cyber-attacks has increased considerably. Likewise, existing infrastructure, policies, practices and cyber security culture needs a relook in light of the new business practices and arrangements in the post COVID-19 era.
This program uses concepts, insights from industry experts to prepare you to address cyber security from an enterprise wide approach, keeping into account the external landscape and future changes within their markets.
This program aims to enable you to devise and implement a new cyber security initiative which is robust, strategically aligned to your business context and scalable in the post COVID-19 “New Normal “era
What you will learn
The goal of this course is to provide an effective combination of theory and practice of cyber security concepts. Live lectures, industry insights and project work will provide a rich forum for virtual class discussions. You will assemble key insights on the following:
- Critique the existing cyber security framework from a strategic business impact perspective
- Gain an in-depth appreciation of global cyber security technologies within various industry domains
- Appraise the multitude of emerging business, financial and reputation risk in the context of geopolitical cyber security and business trends
- Adopt and adapt to re-frame the cyber risk mitigation leading to value creation and safeguard organizational assets
- Appreciate the opportunities, challenges and restraints, and adoption imperatives of a robust cyber security architecture
- Develop skills in cyber security value chain analysis to organize and formulate appropriate strategies for an outsourced or co-sourced approach to cyber security and response services
Upon completion of the program, you will be ready to apply your knowledge to lead strategic decision making to leverage Cyber Security technologies in your business.
Who should take this course?
- This program is designed for a senior functional heads as well as senior and middle level executives across industry sectors who are poised to drive the complexities of cyber risk management in the current context of cyber security.
- This program is aimed at thought leaders and change managers who strive for cyber security capacity building within the ambit of social and cultural aspects of capacity building
- This program is for practitioners and knowledge seekers who are keen for a comprehensive insight on cyber security and to build on their understanding or specialization in the field of cyber risk management.
This program will benefit you if
- You want to lead an organization through the complexities of risk management in the current cyber security landscape
- You aim to gain in-depth insights to emerging threats and impact of cyber risk on an organization’s capacity to accomplish its stated mission
- Benefit from recognition of your understanding or specialization in the field of cyber risk management
- You are interested to learn more about the leading trends in Cyber security
- You wish to create a strategy for applying a cyber-security framework within an organization
Record of Participation
Upon successful completion of the course, you will be awarded a Record of Participation from the University of California, Los Angeles (UCLA) Extension
Share on LinkedIn
You can share your Record of Participation in the Certifications section of your LinkedIn profile, on printed resumes, CVs, or other documents.
Meet the world-class faculty
You will learn from world class instructor in this program from leading business schools and global corporates.
Elena Kvochko is the Chief Trust Officer at SAP New York. She is a Certified Information Security Professional (CISSP) and has been on The Wall Street Journal CIO Council, Board of Advisors at Obsidian Security, Senior Vice- President, and Technology Executive at Bank of America. Previously, she worked as Chief Information Officer of the Global Security Division, and Head of Global Cyber Security Strategy Implementation at Barclays.
She has developed 30+ patent-pending technologies in cybersecurity and privacy, digital payments technology, quantum computing.
Elena was named among the Top 100 CIOs; Leading CIOs – Who Happen to be Female by CIO Magazine, 2019 Business Role Model of the Year by Women in IT Awards, Fortune Most Powerful Women – International, Business Award of The Year, Fortune Most Powerful Women Next Generation.
Elena’s published work appeared in Forbes, Harvard Business Review, White House cybersecurity report, The Wall Street Journal, The New York Times amongst others.
Professor William H. Dutton
DuttonWilliam H. Dutton is an Emeritus Professor at the University of Southern California, an Oxford Martin Fellow, supporting the Global Cyber Security Capacity Centre at the University of Oxford’s Department of Computer Science, and a Senior Fellow at the Oxford Internet Institute (OII). He is also a Visiting Professor at Leeds University. Recently, Bill was
the James H. Quello Professor of Media and Information Policy at Michigan State University, where he was Director of the Quello Center. Prior to that, he was the OII’s Founding Director and the first Professor of Internet Studies at Oxford University. Most recently he co-edited, with Mark Graham, Society and the Internet, 2nd ed (Oxford Un Press 2019), and edited A Research Agenda for Digital Politics (Elgar 2020). His next book will be The Fifth Estate (Oxford Un Press).
Professor Bhavani Thuraisingham
Dr. Bhavani Thuraisingham is the Louis A. Beecherl, Jr. Distinguished Professor of Computer Science and the Executive Director of the Cyber Security Research and Education Institute at the University of Texas, Dallas. She is also a visiting Senior Research Fellow at Kings College, University of London and a Fellow of the ACM, IEEE, and the AAAS.
She has received several awards including the IEEE CS 1997 Technical Achievement Award, ACM SIGSAC 2010 Outstanding Contributions Award, and the ACM SACMAT 10 Year Test of Time Award. She has worked in industry (Honeywell), federal laboratory (MITRE), US government (NSF) and her work has resulted in 120 journal articles, 250 conference papers, 130 keynote and featured addresses, six US patents, fifteen books as well as technology transfer.
She received her PhD from the University of Wales, Swansea, UK, and the prestigious earned higher doctorate (D. Eng) from the University of Bristol, UK.
During the program you will have the chance to learn from world class faculty through live virtual lectures delivered from the USA on the Igesia learning platform. You will interact with industry executives and better understand ongoing trends in Indian and global business. You will be given the opportunity to work in groups on projects of relevance to your business contexts.
You will be welcomed to the program and start connecting with fellow participants in the program and get an overview of the forthcoming program. You will also start forming teams and start considering questions to explore in your customized project work.
Cyber security building blocks
The first module highlights the relevance of cyber threats and vulnerabilities impacting operational risk, litigation risk, and reputation risk. It discusses the key sources of cyber threat actors namely nation states, cyber criminals, and internal organizational threats, likely cyber attack methods and the types of organizations or sectors they typically attack.
Live Virtual Session with Industry Expert
Understanding cyber security technology
Examine how an organization’s systems, networks, and data are interconnected and the various methods of attack and countermeasures in each area. Understand the validity of implementing appropriate technologies to mitigate and secure the system, the network and the data – the three key elements of an organization prone to cyber risk.
Live Virtual Group Work led by Program Coach
Cyber risk and the law
Identification of the most complex aspects of managing cyber risk, namely legal and compliance considerations at a state, national, and international level. Identify the impact of failing to take compliance considerations into account and explore the requirements of your own industry while learning to ask appropriate questions to assess your organization’s adherence to these legal and compliance requirements.
Live Virtual Session with Industry Expert
Impactful leadership in managing cyber risk
This module looks at role of leadership in cyber security capacity building after identifying stakeholders in the governance structure of an organization , the user driven cyber culture and the socio-cultural fabric into account. It provides insights on global values, attitudes and practices of internet users impacting on-line privacy and trust issues. It describes why leaders have to be cognizant of user security mindset towards cyber attack risk mitigation. It describes the leadership role in boosting cyber security consciousness by designing best practices for implementing a cyber secure culture in an organization.
Live Virtual Group Work led by Program Coach
Designing and implementing a cyber risk mitigation strategy
The last module focuses on three phases of a security breach, namely detection, communi- cation, and containment of cyber breach. It focuses on processes and cyber threat mitigation implementation strategy, allocation of financial resources, and establishing an accurate metrics system to keep track of the security systems that have been put in place. It also dwells on the future direction of cyber security, considering the evolving landscape of artificial intelligence, big data, and geolocational data and the increased organizational risks that accompany these advances.
Record of participation from the University of California, Los Angeles (UCLA) Extension
+ Knowledge updates + Alumni Community + Social interactions