Hacking The Cyber Threat Cybersecurity Leadership Program for Executives and Leaderships

hacking the cyber threat Sep 25, 2020

 

 Executive Summary 

The Hacking The Cyber Threat Cybersecurity Leadership Program for Executives and Leaders is a 9 hour comprehensive executive online program comprised of 15 modules designed to transform non-technical business executives into cyber-savvy business executives and leaders. This program provides a foundational understanding of the various components of enterprise wide cybersecurity, the cyber threat actors and cyber threat methodologies that comprise today's cyber threat landscape. This program covers the following areas of cybersecurity: 

  • Integrating The Cyber Threat In Strategic Planning
  • Understanding The Cyber Threat Landscape And The Basics Of Information Technology
  • Understanding Malicious Software
  • Information Operations (Nation State/Advanced Persistent Threat)
  • Critical Infrastructure And Industrial Control Systems
  • Wireless And Mobile Devices
  • Web Infrastructure And Third-Party Risk
  • Cybercrime And Hacktivism
  • The Cyber Underground
  • Cyber Defense, Incident Response And Recovery
  • Cyber Education And Cyber Training
  • Cyber Regulators And Cybersecurity Frameworks
  • Private Sector And Public Sector Partnerships
  • Strategic Challenges Facing The Enterprise

Each module provides our clients with a downloadable PDF document that summarizes each module's specific topics and provides module-specific key questions for our client’s consideration. This information allows our clients to quickly begin a more robust discussion with their organization’s CIO/CISO regarding the key points of each module which can assist in improving the various components of their organization's enterprise-wide cybersecurity program. 

This program is concise, yet comprehensive and specifically designed for today's busy executive/leader who has minimal or no cyber training and does not have the time to take a multi-day cybersecurity course which covers only one specific topic. 

Concepts are presented in a clear, easy to understand, on-demand format that executives and leaders can conveniently access anytime, anywhere on any computer or mobile device—as their respective schedule permits. This cybersecurity leadership course is designed for: 

  • Board of Directors, Audit Committee Members, Cybersecurity Committee Members
  • C-Suite Executives
  • Senior-Level Executives
  • Business Unit Leaders
  • Middle Management
  • Business Professionals In Leadership Positions

Your Instructor 

Pedro “Pete” Cordero retired from the Federal Bureau of Investigation (FBI) after serving 27 years as an FBI Special Agent, specializing in complex investigations in cyber intrusions, counterterrorism, public corruption, and financial institution fraud. 

In this program, Mr. Cordero brings to bear his executive level cybersecurity leadership experience in the following areas: 

  • Served as the FBI Cyber Division Executive leading the FBI Cyber Division's cybercriminal and nation state/advanced persistent threat (APT) intrusion investigations in the U.S. and abroad.
  • Served as the Deputy Director of the National Cyber Investigative Task Force (NCIJTF). 
  • Served as the FBI National Academy Cybersecurity Leadership Instructor.
  • Served as a Big 4 executive-level cybersecurity consultant to board of directors, audit committees, and c-suite executives.
  • Is a Certified Public Accountant (CPA), Computer Information Systems Security Professional (CISP) and holds multiple advanced cybersecurity certifications in various cybersecurity disciplines.
  • Has provided cybersecurity leadership training to senior executives since 2010.

Description of the Program’s Modules 

The following are the summary description and the approximate duration of each module of the program: 

Module 0 Introduction (11 min) 

The Introduction module provides the background, education, credentials and experience of your cybersecurity leadership instructor; a program overview; identifies the benefits of becoming cyber savvy; and understanding the overall impact of a cyber breach to the organization. 

Module 1 Integrating the Cyber Threat in Strategic Planning (25 min) 

Module 1 provides instruction on the importance of implementing a cyber savvy senior leadership team for the organization to strategically improve the enterprise wide cybersecurity program. 

Module 2 Understanding the Cyber Threat Landscape and the Basics of Information Technology Key Takeaways (55 min) 

Module 2 provides instruction on information assurance, today’s cyber threat actors and landscape, the basics of network security, and considerations for improvement of the enterprise wide cybersecurity program. 

Module 3 Understanding Malicious Software Key Takeaways (27 min) 

Module 3 provides instruction of malicious software and considerations for securing the enterprise from malicious software in an enterprise wide cybersecurity program. 

Module 4 Information Operations: Computer Network Defense (CND), Computer Network Exploitation (CNE), Computer Network Attack (CNA) and the Advanced Persistent Threat (APT) Key Takeaways (39 min) 

Module 4 provides instruction on nation state level information operations, efforts against nation state/Advanced Persistent Threat (APT) actors; and considerations for securing the enterprise from nation state/APT actors in an enterprise wide cybersecurity program. 

Module 5 Critical Infrastructure and Industrial Control Systems (ICS) (57 min) 

Module 5 provides instruction on the U.S. critical infrastructure sectors, Industrial Control Systems (ICS), the Internet of Things (IoT) and considerations in securing ICS and IoT within an enterprise wide cybersecurity program. 

Module 6 Wireless and Mobile Devices (50 min) 

Module 6 provides instruction on wireless and mobile devices and considerations in securing wireless and mobile devices within an enterprise wide cybersecurity program. 

Module 7 Web Infrastructure And Third-Party Risk (35 min) 

Module 7 provides instruction on the web, third party vendor, and supply chain and considerations for securing web, third party vendor and supply chain within an enterprise wide cybersecurity program. 

Module 8 Cybercrime And Hacktivism (60 min) 

Module 8 provides instruction on cybercriminal tools and schemes, insider threats, hacktivists and considerations in securing the enterprise against cybercriminals, insiders and hacktivists in an enterprise wide cybersecurity program. 

Module 9 The Cyber Underground (27 min) 

Module 9 provides instruction on the cyber underground and considerations in securing the enterprise from the cyber underground threat in an enterprise wide cybersecurity program. 

Module 10 Cyber Defense, Incident Response And Recovery (36 min) 

Module 10 provides instruction on the enterprise level defense in depth strategy, incident response and recovery capabilities, and considerations in implementing enterprise level cyber defense, incident response and recovery capabilities in an enterprise wide cybersecurity program. 

Module 11 Cyber Education And Cyber Training (26 min) 

Module 11 provides instruction on cybersecurity education and training resources available to an organization; and considerations in improving an organization’s cybersecurity capabilities to support an enterprise wide cybersecurity program. 

Module 12 Cyber Regulators And Cybersecurity Frameworks (38 min) 

Module 12 provides instruction on cybersecurity regulation, cybersecurity regulators, cybersecurity frameworks; and considerations in implementing a cybersecurity framework in an enterprise wide cybersecurity program. 

Module 13 Private Sector And Public Sector Partnerships (17 min) 

Module 13 provides instruction on private and public sector cybersecurity partners available to organizations; and considerations in establishing private and public sector partnerships in an enterprise wide cybersecurity program. 

Module 14 Strategic Challenges Facing The Enterprise (15 min) 

Module 14 provides a review of each of the program’s modules and provides recommendations in addressing strategic challenges organizations are facing in addressing the cybersecurity threat in today’s environment. 

Sign Up To Our Newsletter

For exclusive information about security, cyberthreat and many more...

Learn More about Our Privacy Policy