10162116Cyber Risk Management
Course Information
Description
Through actual cases, this course will take a look at the various types of cyberattacks on businesses, the potential damages and fines, and ways to holistically manage internal and external risks. Cyber Liability Insurance, as a way to transfer risk, will also be examined.
Total Credits
3
Course Competencies
-
Evaluate a cyber risk within an enterprise risk management environmentAssessment StrategiesExamCriteriaIdentify exposures to cyber riskIdentify one internal and one external cyber risk that a business facesDescribe the components that make up the cost of risk for a businessAccurately calculate the cost of riskAchieve a 70% or greater score on the exam
-
Formulate a cyber risk assessmentAssessment StrategiesExamCriteriaIdentify two tangible and intangible properties, two liability exposures, and loss of income for a business experiencing a cyber breachAchieve a 70% or greater score on the exam
-
Compare the principles and practices of various data protection regulationsAssessment StrategiesExamCriteriaDifferentiate between GDPR and CCPAList at least two fines a business is exposed to when data is not protectedExplain the legal responsibilities of a business with regard to protecting dataList three key components of both GDPR and CCPAAchieve a 70% or greater score on the exam
-
Evaluate cyber risks associated with third-party dataAssessment StrategiesData flow diagramsCriteriaIdentify the at-risk points for a business utilizing third-party dataIdentify one of the top five businesses at risk for a data breachList a minimum of three pieces of information for sale on the Dark Web
-
Identify the “at risk” points in the flow of dataAssessment StrategiesData flow analysis chartCriteriaIdentify, with at least 70% accuracy, two specific transactions in an organization where confidential information is sharedIdentify the areas where the information is at risk for a breachDiagram includes two transactionsDiagram identifies what data is being shared
-
Develop a Data Breach Life CycleAssessment StrategiesQuiz, Exam, Written Product - Data Breach LifecycleCriteriaExplain at least two steps to contain losses once a breach is discoveredLife Cycle is for a particular business concerning one specific breachExplain the steps in the Data Breach Life CycleAchieve a 70% or greater score on the quiz and exam
-
Calculate the associated business costs for lack of planning for a cyber attackAssessment StrategiesExamCriteriaDescribe the business costs such as costs to continue operation and loss of incomeCalculations include loss of productivity, physical location, supply chain, technology, reputation, finesAchieve a 70% or greater score on the exam
-
Apply risk mitigation steps in planning to achieve business continuityAssessment StrategiesWritten Product - Business Continuity PlanCriteriaDetermine the critical functions of the organization that must be maintained if an interruption occursOutline four strategies that the company can proactively take to stay in business after a lossPlan includes strategies such as backup of data, temporary use of another premises, insurance, etc.
-
Describe the stages of strategic redeployment planningAssessment StrategiesWritten Product - Redeployment PlanCriteriaPlan includes the four stages as specified by the instructorPlan includes the top priority for each of the four stagesAchieve a score of 70% or greater
-
Conduct a Business Impact Analysis (BIA) to determine the operational impact of a technology shut downAssessment StrategiesWritten Product – Business Impact Analysis (BIA)CriteriaAscertain the importance of the impact on the operations and the finances of a business during a technology shut downIdentify the time, with at least 70% accuracy, when the interruption would be at its highest impact for a particular type of businessIdentify one internal and external operational riskIdentify at least one lawsuit that could arise as the result of a breach
-
Generate a holistic approach to cyber risk management that includes risk retention, risk transfer and risk controlAssessment StrategiesWritten ProductCriteriaIdentify risk management reduction strategiesOutline the steps a business can take to reduce the risk of a cyber attack such as employee training, back up of data, limited access to data, etc.Achieve a score of 70% or greater
-
Evaluate insurance coverages that are typically included in a cyber policyAssessment StrategiesWritten Product - Q&A, ExamCriteriaDescribe the benefits a business would receive from the purchase of a cyber insurance policyDifferentiate between a cyber policy and a general liability policyAchieve a score of 70% or greater on an exam