CYBER SECURITY FOR MANAGERS
This module aims to expose the student to the real issues inherent in the business world in which Cyber Security of IT Information Technology networks and OT Operational and Technical system play an ever-increasing role. It provides a detailed practical description of the scale and scope of the issues/problems, what companies and individuals are confronted with, provides data enabling managers to discuss with Boards and IT departments about requirements, and suggestions for dealing with problems, as well as sources of information and help. A specific case is discussed to demonstrate the types of problems as seen in the maritime transport network which consists of many interconnected large and small enterprises.
Learning, Teaching and Assessment Strategies
Because of the speed of evolution of the Cyber Problem, this module combines classroom lectures with self-learning and directed reading or current articles mainly available on the internet.
Students will be required to study relevant topics before each class in order to be able to participate actively and interact during classroom sessions. Two sessions will be specifically based on students' preparation of a small team project to develop an outline incident readiness assessment plan and an incident recovery plan.
On completion of this module the successful student will be able to:
Understand the scale and scope of the Cyber threat.
Identify types of threats
Understand what a company or entity needs to do to protect itself (assessment, Training, Recovery and business continuity planning etc.
Know where assistance can be had in case of a Cyber event
Know the basic regulations affecting him or her. (Duty of care and Reporting)
This module will call for the successful student to:
Summarise evidence to assist in strategic planning; and be able to provide facts and figures to Management.
Be able to understand elements of trade-offs and costs
Be able to communicate the scope and scale of the problem and the readiness assessment of the entity, to boards, Security and IT departments to determine what investments might need to be made.
Be able to outline a prevention, recovery and Business continuity plan
Know where to get formal White hat Hacker training if so desired