Reasonable Cybersecurity for Business Leaders
Offered By: LinkedIn Learning
Course Description
Overview
Protect your company from cybersecurity threats, liabilities, and enforcement actions. Learn how to comply with the Federal Trade Commission's reasonable cybersecurity standard.
In today's connected world, no business is completely secure. The Federal Trade Commission acknowledges there may be breaches that companies can't control. Instead, they require organizations to practice "reasonable cybersecurity." The definition and standard for reasonable cybersecurity is still evolving, but business leaders can achieve compliance by understanding the basic requirements. This course provides an introduction to reasonable cybersecurity, distilling the most important information in under 30 minutes. Learn from the example of Equifax, a company that didn't realize it was vulnerable until it was too late, and explore an FTC-recommended security framework, NIST, that can help you identify, protect, detect, respond to, and recover from security issues, without sacrificing business productivity or innovation.
In today's connected world, no business is completely secure. The Federal Trade Commission acknowledges there may be breaches that companies can't control. Instead, they require organizations to practice "reasonable cybersecurity." The definition and standard for reasonable cybersecurity is still evolving, but business leaders can achieve compliance by understanding the basic requirements. This course provides an introduction to reasonable cybersecurity, distilling the most important information in under 30 minutes. Learn from the example of Equifax, a company that didn't realize it was vulnerable until it was too late, and explore an FTC-recommended security framework, NIST, that can help you identify, protect, detect, respond to, and recover from security issues, without sacrificing business productivity or innovation.
Syllabus
Introduction
- Practice reasonable cybersecurity
- Cybersecurity framework
- What is reasonable cybersecurity?
- Equifax and reasonableness
- What happened?
- Equifax practice
- Identify
- Protect
- Detect
- Respond
- Recover
- How to practice reasonable cybersecurity
- Next steps
Taught by
Kip Boyle
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity