What, Why, Who, and How of Cybersecurity Strategy Top of Page
 

Online Training

What, Why, Who, and How of Cybersecurity Strategy

Price: $19.00
Quantity:

*(ISC)² Members/Associates can access this course for free by logging into your Member Portal for more information.

 

This article explores how to define, create, and implement a cybersecurity strategy and communicate its value to your organizer’s stakeholders.

Course Summary

Your cybersecurity strategy is your high-level plan for how your business will protect its assets and reduce cyber risk. Developing an effective strategy requires security leaders to understand the what, why, who, and how. What elements make up a cybersecurity strategy? Why is it important? Who are the key leaders and stakeholders? How is a strategy created and implemented? In this article, you’ll learn the answers to these questions and gain the tools you need to get started developing a strategy for your organization.

Key Takeaways:

  • • The elements of governance, risk, and compliance (GRC) in a cybersecurity strategy
  • • Tailoring your strategy to your organization
  • • Implementation within a plan, do, check, act cycle

CPE Reporting

CPE credits earned for this course may be eligible for continuing professional education credits for non-(ISC)² certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility.

Members: Starting January 1st, 2022, CPE Credits for (ISC)² credentials will be reported by Member Services on the 1st of every month. Please allow 10 business days for processing. Courses completed prior to 1/1/2022 will need to be self-reported by members and associates through the (ISC)² CPE Portal accessible via www.isc2.org using your member login credentials.

For specific questions related to your CPE credits or the CPE portal please contact member support - membersupport@isc2.org

Price: $19.00
Quantity: