Overview
The significant rise in information technology, along with increasing threats to data and information security, has raised critical awareness about the dangers posed by hackers. These threats affect not only individuals but also businesses, governments, and various organizations that share information over public networks, such as the internet. This situation highlights the importance of vigilance and proactive measures in our increasingly interconnected world. Consequently, cybersecurity has become a fundamental aspect of organizational strategy and risk management in today’s digital environment.
Besides, in the algorithm-driven world we live in, managing privacy concerns has become a vital function for organizations seeking to safeguard their operations and maintain business continuity, as a significant percentage of people are concerned about the data collected about them. Scholars have argued that perceptions of privacy risk and control are intricately related to distrust in organizations. Companies should take appropriate actions to address these issues.
This course aims to equip Executive MBA students with a comprehensive understanding of cybersecurity and privacy concepts, principles, frameworks, and strategies, providing them with the practical skills necessary to assess risks, establish effective governance structures, and develop strategies to safeguard critical assets across various sectors.
Outline
This course is divided into eight themes for the eight-week period:
- Theme 1: Understand the fundamental concepts and principles of cybersecurity and privacy
- Theme 2: Analyze the current threat landscape and its implications for businesses
- Theme 3: Assess organizational risk and develop appropriate mitigation strategies
- Theme 4: Navigate and implement cybersecurity governance frameworks.
- Theme 5: Develop a cybersecurity strategy aligned with business objectives
- Theme 6: Foster a security-conscious organizational culture
- Theme 7: Incident Response and Recovery Planning
- Theme 8: Governance, Compliance and Budgeting
Learning outcomes
By the end of this course, students should be able to:
- Identify cybersecurity threats and vulnerabilities
- Conduct risk assessments using industry tools.
- Develop cybersecurity and privacy policies and incident response plans.
- Promote a culture of cybersecurity and privacy awareness.
Evaluation
Your grade will be based on the successful completion of:
| Activity | Weight |
| Participation in Discussions “Think Tank participation” | 40% |
| Assignment part #1 | 30% |
| Assignment part #2 | 30% |
| Total | 100% |
To receive a passing grade in this course, you must meet these minimum standards:
- Receive a minimum of 60% on the participation component (e., provide names of applications where participation needed)
- receive an average grade of 60% overall course compone
Materials
Digital course materials
Links to the following course materials will be made available in the course:
M. Whitman and H. Mattord, Principles of Information Security, 7th Edition, Course Technology, 2017, ISBN-10: 1337102067, ISBN-13: 9781337102063
- Recommended Textbook: Joseph Migga Kizza, Ethical and Social Issues in the Information Age, Fifth Edition, 2013, ISBN 978-1-4471-4989-.
- Journal articles and other relevant sources
- All other course materials will be accessed online.