IT and Cybersecurity Leadership Program |
Protect Your Company's Valuable Assets
Cybersecurity doesn't only fall on the shoulders of the Chief Information Officer. Protecting your company’s data requires executives across all departments to be knowledgeable about cyber language and frameworks. The average cost to a company falling victim to a malware attack is $2.4 million, and they generally lose 50 days of productivity. The Ashland University IT and Cybersecurity Leadership Program shows you how to address cybersecurity from a business point of view and develop a cyber-safe culture across your organization.
The Ashland IT and Cybersecurity Leadership Program will equip you with the skills needed to manage cyber risk, measure your company's cyber readiness and develop strategies to keep your organization secure. You will build your own cyber budget, set performance metrics and determine cost-effective ways to protect your infrastructure.
|
8 Modules Online ($4,995)Rolling Admission - Start Anytime
|
Address the cyber issues that matter most to you and your organization. Industry professionals share their real-world expertise and guide you through the eight module curriculum filled with insurance and risk mitigation strategies, readiness frameworks, regulation research, and peer discussions.
You'll walk away with knowledge, plans ready for implementation, and a certificate that shows you've invested in yourself and your career.
You'll walk away with knowledge, plans ready for implementation, and a certificate that shows you've invested in yourself and your career.
Module 1 - Introduction to Cybersecurity Leadership
Gain fundamental principles of security leadership in a digital business landscape. Prepare to safeguard information, ensure compliance, and lead teams toward a security-conscious culture.
- Mix of transactional, transformational, and servant leadership.
- Navigate leadership styles for transitioning from technical expert to manager.
- Reflect on six distinct leadership styles relevant to technical environments.
- Understand the balance between clear accountability and potential bureaucracy.
Module 2 - Strategic Planning, Policy & Leadership
Learn to craft visionary strategies, formulate impactful policies, and lead with clarity. Master the art of steering organizations toward success through real-world examples and best practices.
- Ensure a cohesive approach to cybersecurity.
- Structured approach and essential tools for informed decision-making.
- Scenario-based exercise to balance stakeholder needs.
Module 3 - Identifying Cybersecurity Risks
Identify and prioritize critical cybersecurity risks across diverse threat landscapes. Use real-world case studies and simulations to enhance detection, assessment, and response to vulnerabilities.
- Integration of physical security and cybersecurity.
- Evolving cyber defenses for data protection.
- Hands-on exercise to devise strategic plans.
Module 4 - Enterprise, Cloud and Human Risk
Explore risks tied to enterprise operations, cloud computing, and human factors. Grasp risk management strategies through case studies and interactive discussions.
- Essential processes for businesses to identify and address vulnerabilities.
- Analyze strengths and weaknesses of SaaS Data Storage solutions.
- Enhance enterprise security with a step-by-step assessment.
Module 5 - Effective Communication for IT Leaders
Hone communication skills to convey technical concepts to non-technical stakeholders. Improve both verbal and written communication to foster collaboration and clarity.
- Enhance communicative effectiveness within the IT sector.
- Build relationships and foster collaboration.
- Gain insights into your communication style.
- Master online communication for technical leaders.
Module 6 - Time Management for IT Managers
Master time management by exploring task prioritization, setting clear objectives, and effective delegation techniques. Optimize schedules to ensure project success and promote team growth.
- Refine ability to manage multiple projects efficiently.
- Streamline workflows and enhance team collaborations.
- Gain insights into current practices.
- Empower teams and focus on strategic priorities.
Module 7 - Security and IT Legal Compliance
Understand legal compliance aspects impacting IT and security leadership. Navigate legal obligations, best practices, GDPR, and ethical responsibilities to enhance compliance.
- Protect digital infrastructure to avoid damages.
- Navigate evolving legal frameworks.
- Assess data security in terms of Confidentiality, Integrity, and Availability.
- Comprehensive guide for compliance efforts.
Module 8 - Security Awareness and Culture
Foster a cybersecurity-aware culture where everyone values and practices security principles. Equip yourself with strategies to champion a secure organizational ethos.
- Cultivate a security-savvy culture.
- Focus on instilling a proactive security mindset.
- Address areas for enhancing security-aware culture.
Capstone Projects: Leadership 360° Survey & Action Plan Cybersecurity Assessment Plan
Conduct a 360° feedback survey to gain leadership insights and create a personal action plan for improvement. Use the NIST-based checklist to assess digital assets, identify risks, and implement safeguards
Paul SzyartoPaul is the founder of PS Group Holdings and is directly involved with over 400 enterprise projects throughout the world, focusing on ERP, PPM, and integration solutions. He focuses on helping with implementation of data management solutions and has been part of more than 60 SAP deployments over a six-year period.
|
Amanda WildAmanda is the CEO of HeraTek and is directly involved with leading cyber initiatives in the defense industry during complex regulation changes. She’s an expert in cyber team solutions and contracts on large scalable orchestration and cyber analytics platforms. She’s also responsible for ideation, inception, market feasibility, and market release of dozens of technology products.
|
Murphy BrightMurphy is a Founding Partner for A2E Advisors where he helps companies develop their sales, marketing, and investment strategies as a managerial consultant. He spent 12 years as a U.S. Marine and served as a Foreign Security Advisor where he embedded with small elite teams to advise, assist, and enable foreign militaries.
|
Kevin CaldwellKevin is an Operating Partner for A2E Advisors with clients including startup, seed, and turnaround opportunities that leverage data for growth. Prior to A2E, he was with JPMorgan Chase, assisting in debt financing for middle market companies across the Midwest and applied cyber threat solutions to minimize data exposure.
|
Rick ParimiRick is the Founder and Chief Enterprise Architect of Alexis Networks with a vision to be the world's most customer-centric AI and ML software solution provider. When he was with IBM, he authored software patents. He has also led software innovation and developed technology solutions worth millions.
|
Kurt KumarAs an IT Infrastructure/Software Transformation Specialist, Kurt brings custom applications to life. He’s known to rapidly create and procure cloud/on-prem environments in conjunction with deployment of prototypes. In 2015, he founded CallDoctor, an app allowing users to video chat with their doctor and pay for services.
|