Reasonable Cybersecurity for Business Leaders
Offered By: LinkedIn Learning
Course Description
Overview
Protect your company from cybersecurity threats, liabilities, and enforcement actions. Learn how to comply with the Federal Trade Commission's reasonable cybersecurity standard.
In today's connected world, no business is completely secure. The Federal Trade Commission acknowledges there may be breaches that companies can't control. Instead, they require organizations to practice "reasonable cybersecurity." The definition and standard for reasonable cybersecurity is still evolving, but business leaders can achieve compliance by understanding the basic requirements. This course provides an introduction to reasonable cybersecurity, distilling the most important information in under 30 minutes. Learn from the example of Equifax, a company that didn't realize it was vulnerable until it was too late, and explore an FTC-recommended security framework, NIST, that can help you identify, protect, detect, respond to, and recover from security issues, without sacrificing business productivity or innovation.
In today's connected world, no business is completely secure. The Federal Trade Commission acknowledges there may be breaches that companies can't control. Instead, they require organizations to practice "reasonable cybersecurity." The definition and standard for reasonable cybersecurity is still evolving, but business leaders can achieve compliance by understanding the basic requirements. This course provides an introduction to reasonable cybersecurity, distilling the most important information in under 30 minutes. Learn from the example of Equifax, a company that didn't realize it was vulnerable until it was too late, and explore an FTC-recommended security framework, NIST, that can help you identify, protect, detect, respond to, and recover from security issues, without sacrificing business productivity or innovation.
Syllabus
Introduction
- Practice reasonable cybersecurity
- Cybersecurity framework
- What is reasonable cybersecurity?
- Equifax and reasonableness
- What happened?
- Equifax practice
- Identify
- Protect
- Detect
- Respond
- Recover
- How to practice reasonable cybersecurity
- Next steps
Taught by
Kip Boyle
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network