Reasonable Cybersecurity for Business Leaders
Offered By: LinkedIn Learning
Course Description
Overview
Protect your company from cybersecurity threats, liabilities, and enforcement actions. Learn how to comply with the Federal Trade Commission's reasonable cybersecurity standard.
In today's connected world, no business is completely secure. The Federal Trade Commission acknowledges there may be breaches that companies can't control. Instead, they require organizations to practice "reasonable cybersecurity." The definition and standard for reasonable cybersecurity is still evolving, but business leaders can achieve compliance by understanding the basic requirements. This course provides an introduction to reasonable cybersecurity, distilling the most important information in under 30 minutes. Learn from the example of Equifax, a company that didn't realize it was vulnerable until it was too late, and explore an FTC-recommended security framework, NIST, that can help you identify, protect, detect, respond to, and recover from security issues, without sacrificing business productivity or innovation.
In today's connected world, no business is completely secure. The Federal Trade Commission acknowledges there may be breaches that companies can't control. Instead, they require organizations to practice "reasonable cybersecurity." The definition and standard for reasonable cybersecurity is still evolving, but business leaders can achieve compliance by understanding the basic requirements. This course provides an introduction to reasonable cybersecurity, distilling the most important information in under 30 minutes. Learn from the example of Equifax, a company that didn't realize it was vulnerable until it was too late, and explore an FTC-recommended security framework, NIST, that can help you identify, protect, detect, respond to, and recover from security issues, without sacrificing business productivity or innovation.
Syllabus
Introduction
- Practice reasonable cybersecurity
- Cybersecurity framework
- What is reasonable cybersecurity?
- Equifax and reasonableness
- What happened?
- Equifax practice
- Identify
- Protect
- Detect
- Respond
- Recover
- How to practice reasonable cybersecurity
- Next steps
Taught by
Kip Boyle
Related Courses
Designing and Executing Information Security StrategiesUniversity of Washington via Coursera M&A: Concepts and Theories
New York Institute of Finance via edX Medical Technology and Evaluation
University of Minnesota via Coursera Healthcare Marketplace Capstone
University of Minnesota via Coursera Stress Testing and Risk Regulation – Part 2
New York Institute of Finance via edX