Welcome, Guest Sign In

Cybersecurity Strategies: Protect Your Organization from Cyber Attack

Business Issues Addressed

Cyber attacks pose an unprecedented existential threat to businesses. From espionage, ransoms, political retribution, random acts, and outright theft of key technology, cyber attacks can cripple small and large businesses. The staggering number of attacks coupled with the devastating severity of attack creates a need for leaders to act more decisively to protect their businesses from these threats.

Today's businesses need executives and senior leaders who understand cybersecurity, can effectively build strategies to protect their business, and can work collaboratively to respond to attacks when they occur. Business leaders must understand the foundations of cybersecurity, have tools to make strategic decisions, and invest wisely in cybersecurity controls.

During this course, you will develop an in depth knowledge of the intricacies of cyberspace and learn tools to lead and manage your business amid the constant onslaught of cyber attacks. You will learn to translate the technological underpinnings of cyberspace and cybersecurity into usable principles and tools for making informed strategic business decisions to protect your business from cyber attacks.

Benefits of Attending this Executive Course

At the conclusion of the course, you will be able to:

  • Develop a cybersecurity strategy
  • Integrate cybersecurity into your operations
  • Invest wisely in risk mitigation
  • Create an effective team environment
  • Establish effective corporate policies and investments
  • Collaborate with industry and government in cybersecurity
  • Respond effectively to protect your business

Key Questions Addressed

  • What are the current cyber risks to our company? What are we doing to manage these risks?
  • What is our plan to respond to an attack? Have we tested it?
  • How well informed is our executive leadership in managing cyber risks and impacts?
  • What are the industry best practices and standards that we should use in our cybersecurity strategy?
  • How do we manage the cyber risks with our supply chain and partners?
  • How is the performance of our security team evaluated?
  • How can I help keep my company out of the news for a cyber breach?

DAY 1

Case: Cold War Hacking: Examine one of the first cyber attacks from 39 years ago to understand its similarity to cyber attacks of today.

Mapping Out the Technology Landscape of Cyberspace

  • Understanding the five dimensions of cyberspace: hardware, software, data, networks, and people
  • Identifying the most critical information technology in your business so it can be effectively protected
Case: Dissecting Malware: Uncover the inner workings of cyber attacks to better apply defenses against them.

Dissecting the Anatomy of Cyber Attacks

  • Avoiding hacker information gathering to stop hackers at the first step
  • Demystifying botnets and denial of service
  • Outlining the elements of malware and how it works so that your organization can eliminate the vulnerabilities malware needs
  • Preventing social engineering and personnel manipulation through training and awareness
Case: The Cat and Mouse Game of Attack and Defense: Learn the back and forth tactics between offense and defense through the evolution of one of the most notorious worms of all time.

Implementing Tools for Effective Cyber Defense

  • Establishing identity and access to prevent unauthorized access to critical information
  • Sustaining and maintaining large enterprises to keep pace with evolving threats
  • Protecting information systems and communication lines with effective technology and processes
  • Responding to incidents to contain damage and mitigate impacts
Exercise: Game On, Offense vs. Defense: Make cybersecurity investments and experience how effective they are in defending your business against adversaries through this hands-on exercise.

DAY 2

Case: Attacked from the Inside: Protect your business from insiders by examining motivations, methods, and vulnerabilities of insider attacks.

Integrating Cybersecurity into Business Operations

  • Training and securing employees and personnel to protect your organization's number one vulnerability: people
  • Collaborating with industry and government in cybersecurity to expand your resources to fight against attacks
  • Securing a supply chain to prevent vulnerabilities and attacks from flowing downstream into your products or IT systems
Case: Cybercrime or Cyber War?: Navigate the tangled web of laws, authorities, responsibilities, and legal responses to cyber attacks.

Navigating the Legal Landscape of Cyberspace

  • Understanding legal authority and liability in cyberspace to create effective corporate policies
  • Limiting commercial liability from cyber attacks through proactive risk mitigation
  • Creating effective privacy controls and policies to protect the innocent from malicious attacks
Case: The Cybercrime Economy: Learn the value criminals put on your data to help prioritize where to invest in cyber defense.

Building Effective Strategies to Secure Your Business

  • Prioritizing cost/risk tradeoffs in cybersecurity operations to focus decision making
  • Investing wisely in cyber defense, response and risk mitigation
  • Building a comprehensive strategy with industry best practices
Exercise: Strategic Choices: Prepare your business to succeed in the face of cyber attacks by developing a strategy using the tools and frameworks from the course.

Who should attend

Executives, directors and senior managers will gain the foundational knowledge necessary to make informed decisions regarding cybersecurity to protect their businesses from attacks. You are expected to have a basic understanding of information systems.

Special Features

You will receive methods, tools and frameworks to apply to your technology driven business. The methods are derived from best practices developed after years of experience in government and commercial cybersecurity. Tools are provided to help guide strategic decision making and investments. Frameworks will be provided to help structure a holistic cybersecurity program to increase the resilience of a business in the face of cyber attacks.

You are invited to a reception the first evening of the course at The Athenaeum, Caltech’s faculty club, providing an opportunity to share information with the instructor and other participants.

Course Leader

C. Donald Robinson, PhD, is Chief Technology Officer for defense at CSRA where he is responsible for the technical aspects of the corporate new business portfolio, technical innovation in key programs, and the overall technology strategy and development.

Previously, Dr. Robinson worked in the Northrop Grumman Corporate Analysis Center where he developed and executed strategic advocacy campaigns for key programs. Projects included: missile defense, cyber operations systems, radar and sensor systems, space systems, battle management command and control, and unmanned systems. Each of these projects involved direct advocacy to both the Pentagon and Congressional stakeholders. He was also responsible for analysis and reports to Congress on cyber policy and legislation.

He has also been a program manager profitably delivering technically advanced IT enterprise services and cybersecurity solutions. Projects spanned advanced research, product design, development, integration and test and operations and maintenance. He has worked on multiple contract types for both military and international customers. Key customers have included the U.S. Air Force, U.S. Navy, U.S. Army, U.S. Missile Defense Agency, The Department of Homeland Security, North Atlantic Treaty Organization, and other agencies in the U.S. Government.

Formerly he was the principal technologist for cybersecurity for the $10B Information Systems Sector within Northrop Grumman. Working for the Chief Technology Officer, he was responsible for directing internal technical investments, defining technology roadmaps, investment strategies, and business development in cybersecurity and cyberwarfare. Previously within Northrop Grumman, Dr. Robinson was a capture manager for the cybersecurity portfolio successfully winning multiple programs. As an engineer, he developed architectures for advanced command and control systems for the U.S. Navy, developed distributed classified development environments, and designed interfaces between operational C2 systems of record and national intelligence collection systems.

Dr. Robinson holds a PhD in systems engineering and master’s degree in statistics from the University of Virginia. His bachelor’s degrees are in physics, mathematics, computer science, managerial economics and applied mathematics. He also attended Oxford University.

Schedule

Tuesday and Wednesday,
July 25 - 26, 2017
Day 1 - 8:00 AM - 5:30 PM
Reception - 5:30 PM
Day 2 - 8:00 AM - 5:00 PM
Register

Course Fee: The 2017 fee is $2990. The fee includes the course, instructional materials, continental breakfasts, lunches, and the reception. The fee is due four weeks prior to the course. Each course is limited to 40 executives.

Course Location: California Institute of Technology, Pasadena, California

Hotel Accommodations: Old Pasadena Courtyard by Marriott (Caltech rate $179)
Click here to reserve a room at the Caltech rate. If you have questions, please call Jessika Martinez at 626.755.2523. Hotel rates are subject to change and availability. To ensure your reservation, please guarantee for late arrival.

Questions? 626.395.4042 or ctme@caltech.edu. Registrants will receive a detailed e-mail confirming their registration.

Bring This Course Customized to Your Site

Contact Anne Campbell, Executive Director, acampbell@caltech.edu or 626-395-4046.