Week 8 Preview: Lock in the value – Sustaining your cyber resilience
This module covers:
How to ensure security solutions are embedded into operations.
Learn how to ensure your security solutions are sustainable.
https://cyberleadershipinstitute.com/wp-content/uploads/CSTP-Jan-Schreuder-1.png
This module covers:
How to ensure security solutions are embedded into operations.
Learn how to ensure your security solutions are sustainable.
8.1. Embedding security solutions into operations
https://cyberleadershipinstitute.com/wp-content/uploads/CSTP-Jan-Schreuder-1.png
This module covers:
How to build a reporting framework to measure and report your capabilities.
Key principles to consider when designing cyber risk metrics.
8.2.a. How do you know? Tracking and monitoring ongoing cyber resilience
https://cyberleadershipinstitute.com/wp-content/uploads/CSTP-Jan-Schreuder-1.png
This module covers:
Learn typical metrics to include in reporting.
How to build an active cyber risk profile.
8.2.b. How do you know? Tracking and monitoring ongoing cyber resilience (Part 2)
https://cyberleadershipinstitute.com/wp-content/uploads/CSTP-Jan-Schreuder-1.png
This module covers:
Learn how to apply continuous testing and learning to your cyber transformation program.
What to include in a continuous testing and learning program.
8.3. Continuous testing and learning
https://cyberleadershipinstitute.com/wp-content/uploads/CSTP-Jan-Schreuder-1.png
This module covers:
How to estimate remediation funding.
Where to include remediation funding in the budget.
8.4. Securing remediation funding
https://cyberleadershipinstitute.com/wp-content/uploads/CSTP-Jan-Schreuder-1.png
This module covers:
Examining internal and external factors that could impact the program.
Learn how to manage change.
8.5. Sustaining momentum during constant change
https://cyberleadershipinstitute.com/wp-content/uploads/CSTP-Jan-Schreuder-1.png
This module covers:
How to know which threat intelligence requires strategic action.
Implementing a framework to adjust assess external threat intelligence.
8.6. Adapting your cyber strategies to new and emerging threats
https://cyberleadershipinstitute.com/wp-content/uploads/CSTP-Jan-Schreuder-1.png
This module covers:
Learn how to critically assess the impact of internal changes.
Know what changes to communicate with stakeholders.
Learn about cyber resilience considerations in mergers and acquisitions.
8.7. Ensuring resilience during major organizational change
https://cyberleadershipinstitute.com/wp-content/uploads/CSTP-Jan-Schreuder-1.png
Questions to consider as you conclude the Cyber Strategy and Transformation Program.
Week 8: Action Items