This is compounded by a cyber skill shortage and the growing reputational, financial and legal implications of a cyber breach for company directors and executives.
When it comes to cyber security, a perfect storm is brewing as the threat landscape continues to evolve faster than ever, fuelled by innovation, automation and the drive to the cloud. This is compounded by a cyber skill shortage and the growing reputational, financial and legal implications of a cyber breach for company directors and executives.
About this course
This course is a collaboration between UTS and ITIC.
Cybersecurity awareness is vital for directors and executives from the board level, down. This course provides the relevant commercial and technical framework and mindset that organisations need to navigate complexities and achieve optimal returns on their investments in people, processes and systems.
Course structure
Three key areas will be covered during this course:
A concise, high-level understanding of regulation and compliance issues and personal liability for company directors
Risk evaluation and management framework to support development of responses commensurate to the level of cybersecurity threat
Shifting the cyber strategy mindset from compliance/limitation of legal liability towards maximising the efficacy of cyber security investments.
Learning outcomes
Working knowledge of relevant cybersecurity legislation for board directors
A basic risk management framework to evaluable cybersecurity investment
A mindset towards cybersecurity that looks at maximising the efficacy of cybersecurity.
UTS is the top-ranked young university in Australia. Our vision is to be a leading public university of technology recognised for our global impact. We’re known for our innovative teaching. We’re committed to practical innovation and research that benefits industry and society.
We believe in social change to create a more just and equal world. UTS acknowledges the Gadigal People of the Eora Nation and the Boorooberongal People of the Dharug Nation.
Upon whose ancestral lands our campuses now stand. We would also like to pay respect to the Elders both past and present, acknowledging them as the traditional custodians of knowledge for these lands.
Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers.
The nationally recognised Statement of Attainment in Digital Security Basics equips you with the fundamental skills and knowledge in personal and organisational digital security. Learn to recognise cyber security risks and gain and introduction to computer networking concepts.
Our CISM training methodology provides an in-depth coverage of contents across the Four CISM domains with a clear focus on building concepts and solving ISACA released CISM exam questions.
The phrase cyber security refers to the collection of processes, practices and technologies that have been designed to protect any connected systems, networks and data from unauthorised access.
CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management
© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy