Updated for October 2015.
Please read the ONE STAR review below - it is 100% valid. This course does not teach specific tools or hack techniques. As you will see in the MANY FIVE STAR reviews we teach critical concepts, frameworks, models, and actionable items that will empower you to weave cyber security into the daily practices of a dynamic, lean fast growing business.
The course is a high impact video series that will empower you to get started immediately.
Every teaching and every recommendation in the cyber security framework that is taught leverages a few core principles:
This lecture defines intellectual property as your clients and your leadership view it, value generating assets. This is a key pillar in the cyber resilient framework.
This lecture lays out how to keep track of your IP in a way that enables your team to focus on growth, not paperwork.
This lecture provides you the high impact questions that you will use to assess each item of IP, this will provide insight into how resilient it is today.
This lecture reviews key areas of access control that ensures you have no blind spots and your team is enabled to do what they need to, securely.
This lecture shows the inherent weaknesses in the legacy models of thinking and provides a new model of cyber resilient business focused thinking.
This lecture will guide you though the process of assessing your business processes with the goal of understanding your cyber resilience.
This lecture will show you how to assess your business process in a clear, concise, and consistent fashion.
This lecture will introduce you to a model of defining attackers in a way business leadership and external investors can quickly understand.
This lecture provides the teaching and details in understanding the complexity of attackers and underscores the challenge that defenders face protecting the business.
This lecture provides an overview of how to add meaningful and helpful metrics to the boardroom and the internal team.
This lecture walks though how to create meaningful metrics to business leaders.
This lecture walks though how to create metrics that show your current cyber resilient state in a way that encourages the team to be fully engaged in your cyber security program.
This lecture reviews all the key points that were discussed in this module and how they benefit the business.
This lecture shows you how to leverage key phrases and social images to get the maximum impact when communicating your cyber resilint program.
This lecture shows you how to package everything we have covered to ensure that the team, business peers, and investors understand the need and position of the cyber resilient program.
Conor Sherman helps fast-moving pre-IPO companies identify and eliminate cyber vulnerabilities by creating lean security programs that bring exponential threat reduction with incremental investment.
He loves engaging with innovative, high-energy, high-impact teams that are passionate about achieving their mission. He has a history of enabling these teams by removing the pain, fear, and frustration that innovators and business leaders often feel when dealing with technical threats.
It is essential for modern professionals to build cohesive, motivated teams quickly. With nearly 3 decades of diverse experience in Global IT leadership, and education, Tony delivers high energy teaching and presentations that artfully package relevant content in an engaging delivery. A powerful presenter and, engaging educator Tony thrives on sharing his hard won expertise with a wide range of professional services clients from start ups to sector leaders and independent professionals of all walks of life.
From managing start-ups to $50M projects, from kick-off to $18M project rescues and with major successes in companies such as IBM, Kaiser Permanente, Charles Schwab and SAIC Tony has had an enormous amount of experience and real world success and now Tony is looking to transfer those skills into you.