Cyber Security: Build a Secure, Resilient Company

How Investors and Founders can weave Cyber Resilience into their startup's DNA while leading high growth companies.
4.5 (8 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
2,751 students enrolled
$19
$20
5% off
Take This Course
  • Lectures 21
  • Length 1 hour
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 8/2015 English

Course Description

Updated for October 2015.

Please read the ONE STAR review below - it is 100% valid. This course does not teach specific tools or hack techniques. As you will see in the MANY FIVE STAR reviews we teach critical concepts, frameworks, models, and actionable items that will empower you to weave cyber security into the daily practices of a dynamic, lean fast growing business.

The course is a high impact video series that will empower you to get started immediately.

Every teaching and every recommendation in the cyber security framework that is taught leverages a few core principles:

  • Business First
  • 90/10 Output (90% Results with 10% Effort)
  • Resilience over Security
  • Protection - Detection - Response Triad
  • Work Hard Once (Ensuring no wasted Effort)

You will learn how to:
  • Create meaningful security metrics for multiple audiences
  • Increase leadership engagement in cyber security by using the right language and frameworks
  • Discover your Resilience Score for every business process
  • Understand what your intellectual property is and where it is
  • Understand and manage who has access to your intellectual property
  • How to leverage metrics for transparency and security engagement
  • How to move cyber security conversation from the data center, to the boardroom and the water cooler
The concepts are crisp and the supplemental handouts ensure you will have tangible, actionable that you can immediately leverage.

What are the requirements?

  • A desire to change the status quo of the security posture of the business

What am I going to get from this course?

  • Create meaningful security metrics for multiple audiences
  • Increase leadership engagement in cyber security by using the right language and frameworks
  • Discover your Resilience Score for every Business Process
  • Understand what your intellectual property is and where it is
  • Understand and manage who has access to your intellectual property
  • How to leverage metrics for transparency and security engagement
  • How to move cyber security conversation from the datacenter, to the boardroom and the water cooler

What is the target audience?

  • Investors who want to learn how to guide the cyber security conversation of startups
  • Leadership of lean startups who need to manage cyber security while they focus on the business

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction To The Framework & Philosophy
05:45

This lecture gives a brief high level introduction to the need for cyber resilience vs "security" and outlines the framework for the rest of the course.

Section 2: Understanding What Your IP Is & Who Has Access To It
02:39

This lecture defines intellectual property as your clients and your leadership view it, value generating assets. This is a key pillar in the cyber resilient framework.

05:35

This lecture lays out how to keep track of your IP in a way that enables your team to focus on growth, not paperwork.

03:47

This lecture provides you the high impact questions that you will use to assess each item of IP, this will provide insight into how resilient it is today.

06:06

This lecture reviews key areas of access control that ensures you have no blind spots and your team is enabled to do what they need to, securely.

Lecture 2 - Checking In
00:43
Section 3: Know Thyself - Discovering your “Resilience Score”
04:07

This lecture shows the inherent weaknesses in the legacy models of thinking and provides a new model of cyber resilient business focused thinking.

04:42

This lecture will guide you though the process of assessing your business processes with the goal of understanding your cyber resilience.

02:01

This lecture will show you how to assess your business process in a clear, concise, and consistent fashion.

Lecture 3 - Checking In
00:42
Section 4: Understanding The Defenders Rubik's Cube
01:53

This lecture will introduce you to a model of defining attackers in a way business leadership and external investors can quickly understand.

08:50

This lecture provides the teaching and details in understanding the complexity of attackers and underscores the challenge that defenders face protecting the business.

Lecture 4 - Checking In
00:22
Section 5: How To Create Metrics That Matter
02:32

This lecture provides an overview of how to add meaningful and helpful metrics to the boardroom and the internal team.

03:33

This lecture walks though how to create meaningful metrics to business leaders.

03:11

This lecture walks though how to create metrics that show your current cyber resilient state in a way that encourages the team to be fully engaged in your cyber security program.

Lecture 5 - Checking In
00:35
Section 6: Leading From Strength In The Cyber Security Conversation
01:38

This lecture reviews all the key points that were discussed in this module and how they benefit the business.

03:15

This lecture shows you how to leverage key phrases and social images to get the maximum impact when communicating your cyber resilint program.

01:34

This lecture shows you how to package everything we have covered to ensure that the team, business peers, and investors understand the need and position of the cyber resilient program.

Lecture 6 - Till Next Time
00:43

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Conor Sherman, Cyber Security Architect

Conor Sherman helps fast-moving pre-IPO companies identify and eliminate cyber vulnerabilities by creating lean security programs that bring exponential threat reduction with incremental investment.

He loves engaging with innovative, high-energy, high-impact teams that are passionate about achieving their mission. He has a history of enabling these teams by removing the pain, fear, and frustration that innovators and business leaders often feel when dealing with technical threats.

Instructor Biography

Antony Sherman, The Implementation Rabbi

It is essential for modern professionals to build cohesive, motivated teams quickly. With nearly 3 decades of diverse experience in Global IT leadership, and education, Tony delivers high energy teaching and presentations that artfully package relevant content in an engaging delivery. A powerful presenter and, engaging educator Tony thrives on sharing his hard won expertise with a wide range of professional services clients from start ups to sector leaders and independent professionals of all walks of life.

From managing start-ups to $50M projects, from kick-off to $18M project rescues and with major successes in companies such as IBM, Kaiser Permanente, Charles Schwab and SAIC Tony has had an enormous amount of experience and real world success and now Tony is looking to transfer those skills into you.

Ready to start learning?
Take This Course