Cybersecurity for Managers: A Playbook

Build your action plan for a more cyber resilient organization

Download Brochure

Get Your Brochure

Course Dates

STARTS ON

November 14, 2024

Course Duration

DURATION

6 weeks, online
5-6 hours per week

Course Fee

PROGRAM FEE

US$2,625

Course Information Flexible payment available
Course Fee

For Your Team

Enroll your team and learn with your peers

Learn More

Develop Future-Ready Skills Today

Emeritus is collaborating with MIT Sloan Executive Education to help you build future-ready skills. Enroll before and get up to 11% tuition assistance to set yourself up for professional success.​

Application Details

Early Registration Benefit is live as per below schedule. The full program fee is $2950 as of the start date.

program fee

US$2,625

Pay by

Cybersecurity: Creating a Culture of Awareness

One of the biggest myths is that cybersecurity is just an IT problem. Decisions about cybersecurity have implications throughout your organization—not only for technology-focused teams, but for every team. It only takes one bad actor or one mistake to put the entire organization in jeopardy. Therefore, all of us have a role to play in keeping our organization secure.

Who Is This Program For?

This online program is for business leaders, managers, and executives in both technical and non-technical positions looking to build an action plan for a more cyber resilient organization. Technology and business consultants and others acting as liaisons between technology and business units will also benefit.

There are no technical prerequisites for this program.

This program will:

  • Offer frameworks that provide a strategic view of an organization’s cybersecurity risk management, both quantitative and qualitative
  • Cover the leading approaches to managing cybersecurity, including 'defense in depth' and the National Institute of Standards and Technology (NIST) Cybersecurity Framework
  • Offer a practical interpretation of the tradeoffs between security and privacy, and a method for understanding your organization's priorities
  • Develop the vocabulary of cybersecurity to support informed conversations with your CISO, CTO, and other technology leaders

Impact

  • A framework that provides a strategic view of an organization’s cybersecurity risk management, including management mechanisms you can put in place immediately
  • A playbook with actionable next steps for improving a culture of cyber awareness within your organization
  • The language and vocabulary to support informed conversation with your CISO, CTO, and other technology leaders
  • An appreciation of how decisions made by technologists may affect the business landscape within your organization
  • An awareness of the leading approaches to managing cybersecurity, including 'defense in depth' and the National Institute of Standards and Technology (NIST) Cybersecurity Framework
  • A practical interpretation of the tradeoffs between security and privacy, and a method for understanding your organization's priorities

Program Modules

Orientation Module:

Welcome to Your Online Campus

Module 1:

Understanding the Threat Landscape

Gain an overview of the key concepts and practices in cybersecurity and identify how to achieve cyber safety.

Module 2:

Organizing Cyber Management Priorities: The National Institute of Standards and Technology (NIST) Cybersecurity Framework

Use the High-Tek Sensors case to learn about the NIST Cybersecurity Framework and apply key concepts to individual organizations.

Module 3:

Measuring Risk Exposure

Gain an understanding of risk management practices, qualitative and quantitative frameworks for measuring risk and cyber insurance.

Module 4:

Improving Defenses with Systems and Technology

Learn the basics of cybersecurity resource allocation, the concept of ‘defense in depth' and how to improve defenses.

Module 5:

Building a Culture of Cybersecurity

Learn about management mechanisms for influencing cybersecurity culture within organizations using The Cybersecurity Culture Model.

Module 6:

Exploring Ethics in Cybersecurity

Understand important tradeoffs between security and privacy and the considerations of ethics in cybersecurity using the Apple-FBI controversy as an example.

Orientation Module:

Welcome to Your Online Campus

Module 4:

Improving Defenses with Systems and Technology

Learn the basics of cybersecurity resource allocation, the concept of ‘defense in depth' and how to improve defenses.

Module 1:

Understanding the Threat Landscape

Gain an overview of the key concepts and practices in cybersecurity and identify how to achieve cyber safety.

Module 5:

Building a Culture of Cybersecurity

Learn about management mechanisms for influencing cybersecurity culture within organizations using The Cybersecurity Culture Model.

Module 2:

Organizing Cyber Management Priorities: The National Institute of Standards and Technology (NIST) Cybersecurity Framework

Use the High-Tek Sensors case to learn about the NIST Cybersecurity Framework and apply key concepts to individual organizations.

Module 6:

Exploring Ethics in Cybersecurity

Understand important tradeoffs between security and privacy and the considerations of ethics in cybersecurity using the Apple-FBI controversy as an example.

Module 3:

Measuring Risk Exposure

Gain an understanding of risk management practices, qualitative and quantitative frameworks for measuring risk and cyber insurance.

Download Brochure

Program Highlights

Decorative image relating to text that follows

Interactive Cybersecurity Simulation

Test out different budget scenarios for prevention, detection, and response – and learn how each affects profitability

Decorative image relating to text that follows

Case Studies and Examples

Insurance case study on creating a culture of prevention and awareness. Manufacturing case study featuring the NIST Cybersecurity framework. Ethics considerations in cybersecurity explored through a case study involving Apple Inc.

Industry Perspectives

In depth interview with a cloud cybersecurity industry expert

Decorative image relating to text that follows

A Personalized Cybersecurity Playbook

Bring together key concepts and insights from the program modules to build an action plan—a playbook—of what you will do next

Faculty

Faculty Member Stuart Madnick

Stuart Madnick

John Norris Maguire (1960) Professor of Information Technology; Professor, Information Technology and Engineering Systems; Co-Director, PROFIT Program

Stuart Madnick is the John Norris Maguire Professor of Information Technologies at the MIT Sloan School of Management, a Professor of Engineering Systems at the MIT School of Engineering, and the Founding Director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity. Madnick’s involvement in cybersecurity research goes back to 1979, when he coauthored the book Computer Security. Currently he heads the Cybersecurity at MIT Sloan initiative, formerly called the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity, aka (IC)3.

Faculty Member Keri Pearlson

Keri Pearlson

Executive Director, Cybersecurity at MIT Sloan

Keri Pearlson is the Executive Director of Cybersecurity at MIT Sloan and has held positions in academia and industry including Babson College, The University of Texas at Austin, Gartner’s Research Board, CSC, and AT&T. She founded KP Partners, a CIO advisory services firm and the IT Leaders’ Forum, a community of next generation IT executives. She is the founding director of the Analytics Leadership Consortium at the International Institute of Analytics. Pearlson began her career at Hughes Aircraft Company as a systems analyst.

Faculty Member Dr. Michael Siegel

Dr. Michael Siegel

Director of Cybersecurity at MIT Sloan (CAMS) and Principal Research Scientist

Dr. Michael Siegel is a Principal Research Scientist at the Sloan School of Management, Massachusetts Institute of Technology. He is also the Director of Cybersecurity at MIT Sloan (CAMS). Dr. Siegel’s research focuses on the management, strategy, technology, and organizational issues related to cybersecurity with specific interest in vulnerability markets, cyber risk metrics, dark web business models, IoT endpoint security, cybersecurity workforce development, and educating management in cybersecurity. He also has done research in the intelligent integration of information systems, risk management, insurgency and state stability, data analytics, healthcare systems, and systems modeling. More info

What Participants Say

"As mentioned, the program was understandable for people without a technical background. As a C-suite executive from the business side, it was a perfect fit for me."

— Martin Burns, Chief Industry Operations Officer, Investment Company Institute

Sarah Taylor

"I have a much better understanding of the types of threats I need to consider for my company, including some jargon I didn't previously understand. I loved the sections on building a culture of security and I am actively implementing some of those ideas."

— Sarah Taylor, General Manager at Research Square USA

"The program showcases an extended view of Cybersecurity being a business problem, and how people can contribute to fight the cyber threat."

— Brian Ferreira, VP, Gartner

Bruno Schmid

"I really liked the simulation of applying costs for cybersecurity, and the discussion about the Apple case. It makes one realize the number of layers affected when such incidents happen."

— Bruno Schmid, Senior Security Engineer at Avectris Switzerland

"The program was a great introduction and guide. The concepts were very well explained."

— Isabel Sauerbrey, Senior Vice President of Information Technology & Operations at Roswell Biotechnologies

"The best part is the videos and especially discussions. Applying what you have learned at the same time as learning from other students' points of view."

— Simon Mzaouakk, VP- Technology Officer at Watertown Savings Bank USA

Heng Chye Carter Tan

"Interactions with the class participants and simulations helped me understand what like-minded professionals face in their cybersecurity related challenges."

— Heng Chye Carter Tan, Enterprise Solutions Architect at Keppel Enterprise Services Singapore

Certificate

Example image of certificate that will be awarded after successful completion of this program

Certificate

Receive a verified digital certificate of completion from MIT Sloan School of Management. This program also counts towards an MIT Sloan Executive Certificate.

Download Brochure

After successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, in the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT Sloan.

FAQs

  • How do I know if this program is right for me?

    After reviewing the information on the program landing page, we recommend you submit the short form above to gain access to the program brochure, which includes more in-depth information. If you still have questions on whether this program is a good fit for you, please email learner.success@emeritus.org, and a dedicated program advisor will follow-up with you very shortly.


    Are there any prerequisites for this program?

    Some programs do have prerequisites, particularly the more technical ones. This information will be noted on the program landing page, as well as in the program brochure. If you are uncertain about program prerequisites and your capabilities, please email us at the ID mentioned above.


    Note that, unless otherwise stated on the program web page, all programs are taught in English and proficiency in English is required.


    What is the typical class profile?

    More than 50 percent of our participants are from outside the United States. Class profiles vary from one cohort to the next, but, generally, our online certificates draw a highly diverse audience in terms of professional experience, industry, and geography — leading to a very rich peer learning and networking experience.


    What other dates will this program be offered in the future?

    Check back to this program web page or email us to inquire if future program dates or the timeline for future offerings have been confirmed yet.

  • How much time is required each week?

    Each program includes an estimated learner effort per week. This is referenced at the top of the program landing page under the Duration section, as well as in the program brochure, which you can obtain by submitting the short form at the top of this web page.


    How will my time be spent?

    We have designed this program to fit into your current working life as efficiently as possible. Time will be spent among a variety of activities including:



    • Engaging with recorded video lectures from faculty
    • Attending webinars and office hours, as per the specific program schedule
    • Reading or engaging with examples of core topics
    • Completing knowledge checks/quizzes and required activities
    • Engaging in moderated discussion groups with your peers
    • Completing your final project, if required

    The program is designed to be highly interactive while also allowing time for self-reflection and to demonstrate an understanding of the core topics through various active learning exercises. Please email us if you need further clarification on program activities.


    What is it like to learn online with the learning collaborator, Emeritus?

    More than 300,000 learners across 200 countries have chosen to advance their skills with Emeritus and its educational learning partners. In fact, 90 percent of the respondents of a recent survey across all our programs said that their learning outcomes were met or exceeded.

    All the contents of the course would be made available to students at the commencement of the course. However, to ensure the program delivers the desired learning outcomes the students may appoint Emeritus to manage the delivery of the program in a cohort-based manner the cost of which is already included in the overall course fee of the course.

    A dedicated program support team is available 24/5 (Monday to Friday) to answer questions about the learning platform, technical issues, or anything else that may affect your learning experience.


    How do I interact with other program participants?

    Peer learning adds substantially to the overall learning experience and is an important part of the program. You can connect and communicate with other participants through our learning platform.

  • What are the requirements to earn the certificate?

    Each program includes an estimated learner effort per week, so you can gauge what will be required before you enroll. This is referenced at the top of the program landing page under the Duration section, as well as in the program brochure, which you can obtain by submitting the short form at the top of this web page. All programs are designed to fit into your working life.

    This program is scored as a pass or no-pass; participants must complete the required activities to pass and obtain the certificate of completion. Some programs include a final project submission or other assignments to obtain passing status. This information will be noted in the program brochure. Please email us if you need further clarification on any specific program requirements.


    What type of certificate will I receive?

    Upon successful completion of the program, you will receive a smart digital certificate. The smart digital certificate can be shared with friends, family, schools, or potential employers. You can use it on your cover letter, resume, and/or display it on your LinkedIn profile.
    The digital certificate will be sent approximately two weeks after the program, once grading is complete.


    Can I get the hard copy of the certificate?

    No, only verified digital certificates will be issued upon successful completion. This allows you to share your credentials on social platforms such as LinkedIn, Facebook, and Twitter.


    Do I receive alumni status after completing this program?

    No, there is no alumni status granted for this program. In some cases, there are credits that count toward a higher level of certification. This information will be clearly noted in the program brochure.


    How long will I have access to the learning materials?

    You will have access to the online learning platform and all the videos and program materials for 12 months following the program start date. Access to the learning platform is restricted to registered participants per the terms of agreement.

  • What equipment or technical requirements are there for this program?

    Participants will need the latest version of their preferred browser to access the learning platform. In addition, Microsoft Office and a PDF viewer are required to access documents, spreadsheets, presentations, PDF files, and transcripts.


    Do I need to be online to access the program content?

    Yes, the learning platform is accessed via the internet, and video content is not available for download. However, you can download files of video transcripts, assignment templates, readings, etc. For maximum flexibility, you can access program content from a desktop, laptop, tablet, or mobile device.

    Video lectures must be streamed via the internet, and any livestream webinars and office hours will require an internet connection. However, these sessions are always recorded, so you may view them later.

  • Can I still register if the registration deadline has passed?

    Yes, you can register up until seven days past the published start date of the program without missing any of the core program material or learnings.


    What is the program fee, and what forms of payment do you accept?

    The program fee is noted at the top of this program web page and usually referenced in the program brochure as well.

    • Flexible payment options are available (see details below as well as at the top of this program web page next to FEE).
    • Tuition assistance is available for participants who qualify. Please email learner.success@emeritus.org.

    What if I don’t have a credit card? Is there another method of payment accepted?

    Yes, you can do the bank remittance in the program currency via wire transfer or debit card. Please contact your program advisor, or email us for details.


    I was not able to use the discount code provided. Can you help?

    Yes! Please email us with the details of the program you are interested in, and we will assist you.


    How can I obtain an invoice for payment?

    Please email us your invoicing requirements and the specific program you’re interested in enrolling in.


    Is there an option to make flexible payments for this program?

    Yes, the flexible payment option allows a participant to pay the program fee in installments. This option is made available on the payment page and should be selected before submitting the payment.


    How can I obtain a W9 form?

    Please connect with us via email for assistance.


    Who will be collecting the payment for the program?

    Emeritus collects all program payments, provides learner enrollment and program support, and manages learning platform services.


    Are there any restrictions on the types of funding that can be used to pay for the program?

    Program fees for Emeritus programs with MIT Sloan Executive Education may not be paid for with (a) funds from the GI Bill, the Post-9/11 Educational Assistance Act of 2008, or similar types of military education funding benefits or (b) Title IV financial aid funds.

  • What is the program refund and deferral policy?

    For the program refund and deferral policy, please click the link here.

Didn't find what you were looking for? Write to us at learner.success@emeritus.org or Schedule a call with one of our Program Advisors or call us at +44 150 730 4811 (UK) / +1 401 264 8575 (US) / +65 3138 5193 (SG)

Apply Now

Early registrations are encouraged. Seats fill up quickly!

Flexible payment options available. Learn more.