Risk, Security, & Resiliency Management Certificate. Earn a Certificate Essential to Business Operations in a Growing Field

Size: px
Start display at page:

Download "Risk, Security, & Resiliency Management Certificate. Earn a Certificate Essential to Business Operations in a Growing Field"

Transcription

1 Business, Management & Legal Risk, Security, & Resiliency Management Certificate Earn a Certificate Essential to Business Operations in a Growing Field explore. experience. expand.

2 Become a Valued Professional in Business Protection, Planning, & Resiliency A volatile marketplace, abrupt regulatory changes, supply-chain disruptions, natural disasters, and safety and security threats can imperil business and government functions. Learn core knowledge and skills essential to leaders in the growing field of risk and resiliency management, business contingency planning, and security. Help plan against threats and hazards and ensure continued business operations. An Expanding Field Professionals who assess business risks and create plans to minimize them are part of a growing, specialized field. Supervisory and consulting jobs include: Business Continuity & Contingency Planners Managers in Business Resiliency, Capability Review, & Risk Reduction Operational Risk Analysts Resilience & Risk Reduction Coordinators Security Architects & Researchers Enterprise Risk Managers The Certificate Curriculum This 7-course professional certificate provides a comprehensive curriculum covering both the theory and practical application of risk, contingency, and resiliency planning and remediation. All core courses must be completed within a 5-year period for a total of 26 units. Candidates who complete the requirements are awarded a certificate bearing the gold seal of the University of California and signed by the dean of UCLA Extension. Required Courses X X X X X X Emergency Preparedness and Homeland Security: An Overview Human, Legal-Compliance, and Ethical Issues of Emergency Preparedness Crisis Management and Communications: Safeguarding Image and Viability Creating a Successful Business Strategic Risk Management: Processes, Tools, Analyses Security Management: Facilities, Cyber, Products, Analyses Plus One of the Following X X Internship in Risk, Security, & Resiliency Management Capstone in Resiliency Management

3 Course Descriptions All descriptions are subject to change. For details visit uclaextension.edu/risk. Emergency Preparedness and Homeland Security: An Overview X Management 4 units Gain an understanding of the key elements of emergency preparedness, including Department of Homeland Security issues and resources; elements of effectively managing any major crisis; and how to assist in the development of emergency preparedness strategy in a private company or a government agency. Learn about protection planning for an organization s employees, customers, and physical assets; insuring compliance with applicable federal, state, and local regulations; and how to look internally at processes and procedures in order to plan and build network or external relationships, resources, assistance, and cooperation. The course includes student work with selected training sources and exercises that reinforce key learning objectives. (Must be completed before or concurrently with the courses listed below). Human, Legal-Compliance, and Ethical Issues of Emergency Preparedness X Management 4 units This course provides training and education to effectively deal with the fulcrum point that determines the success or failure of every preparedness plan: the human execution of best practices in a highly stressed environment defined by minute-to-minute decision-making and actions. Learn how to increase plan effectiveness by working in advance to prepare others for the human, legal, and ethical issues that arise in any disaster. (Note: This course satisfies the ethics requirement for this certificate.) Crisis Management and Communications: Safeguarding Image and Viability Creating a Successful Business X Entrepreneurship 4 units Developing a business model that delivers unique value is key to reducing risks and increasing the chances of success. You must objectively analyze the competitive landscape, and innovate and articulate unique value to implement a strategy and anticipate financial rewards. This course examines these essentials for success. Learn how to define a business model and strategy for companies to thrive, even with intense competition. Business bestsellers such as Blue Ocean Strategy and Good to Great, are used, as well as real-world examples. Learn the importance of value and execution. Topics include competitive analysis, creating and defining a unique selling advantage, identifying the customer, and honing a strategy. X Communication 2 units Communication professionals personnel must deal rapidly, correctly, comprehensively, and objectively with a disaster or crisis. This course provides tools to identify potential threats and opportunities in communications alternatives that directly impact agency or business effectiveness, or survival during the crisis management and recovery stages. Instruction includes examination of actual crisis case studies.

4 Strategic Risk Management: Processes, Tools, Analyses X Management 4 units Risk management began in the 1690 s in the Western world with Lloyd s of London and its financing of unexpected shipping losses. Today, over 2 million Americans are employed in the insurance industry. Learn the risk management framework derived from legal and financial concepts of risk aversion, acceptance, mitigation, and financing. Explore the duties and tools of risk managers with real-world examples. Also explored are the risk management processes, their application to specific businesses, and their relation to all parts of a business organization. Key insurance industry tools and terminology are presented and applied. Experience the challenges of a risk manager by applying course materials to your own case studies and analyses. Security Management: Facilities, Cyber, Products, Analyses X Management 4 units This course focuses on the education, technologies, and policies to protect people, information, infrastructure, and other assets. Learn how to design secure systems, evaluate and measure protection alternatives, and ensure that appropriate privacy levels are maintained for individual users, businesses, government, and other organizations within specific enterprise networks. Gain the tools to budget for security and communicate the case for security investments. Also provided are tools to evaluate return on investments and other calculations to support alternative selections. Course materials and discussions include the evolution of private and public security models, tools, products, roles and responsibilities. Internship in Risk, Security, & Resiliency Management X Management 4 units (Early-enrollment pricing does not apply to this course.) The internship provides practical experience and application of the knowledge and skills learned in the previous courses. Students arrange their internships, subject to UCLA Extension approval, and intern for a minimum of 75 hours with sponsoring companies, businesses, and organizations, which have no obligation to provide compensation. Advisory Board members may have internships available for UCLA Extension students. Prerequisite: Students must be officially enrolled in the Risk, Security, & Resiliency Management Certificate and have successfully completed the other 6 required courses. Capstone in Resiliency Management X Management 4 units Each week build at least one module of a resiliency plan utilizing lessons included in Courses 1-6, with instructor approval of the organization, company, or agency used as the case study. Alternatively, employed students may recommend their employer as the case subject or students may select a company or agency for which substantial public data exists, such as, publically traded corporations which file detailed annual reports. (Must be taken after all courses above are completed or concurrently with the 6th course.) Because uncertainty is now a constant business threat, contingency and resiliency planners are crucial to business success. Matt Bogaard, Head of Corporate Security & Facility Operations, DreamWorks Animation

5 Gain Industry Expertise at UCLA Extension The Risk, Security, & Resiliency Management Certificate goes beyond traditional, fiduciary risk management courses to provide the basics to enter a growing field or gain new skills to boost your existing career. You get: Practical knowledge: To use on the job immediately Expert instruction: From industry leaders with years of experience Modern, up-to-date curriculum: The newest practices and tools Flexible, Affordable & Accessible: Convenient courses for working adults with many online or evenings & weekends at our downtown Los Angeles and Westwood locations. Courses are pay as you go, with no large, upfront deposits. Total costs are well below comparable programs. No degrees or prior training required under our open-admission policy. Advisory Board Members of our Risk, Security, & Resiliency Management Certificate Advisory Board are distinguished leaders in the field. They advise and guide the academic content of the certificate and courses. Norman Abrams, Distinguished Professor of Law Emeritus, UCLA Law School Matt Bogaard, Head of Corporate Security & Facility Operations, DreamWorks Animation James Featherstone, General Manager, City of Los Angeles Emergency Management Division Eric A. Hoffman, Chief Casualty Officer - North America, Zurich Services Corp Mark Kroeker, Senior Vice President, Justice and Rule of Law Darby LaJoye, Federal Security Director, Transportation Security Administration Elsa Lee, CEO, Advantage SCO Paul Lipscomb, Deputy Chief of Police, Los Angeles Port Police Michael Little, Assistant Chief, Los Angeles Fire Department Jana Monroe, Director of Corporate Security, Southern California Edison Paul Myers, Associate Director, Emergency Preparedness, Save the Children, U.S. Programs Scott Nelson, President, SRMG Gabriela Noriega, Emergency Management Coordinator, City of Los Angeles Scott Norwood, Emergency and Homeland Security Preparedness Manager, LA County Metropolitan Transportation Authority Lauren Ohl-Trlica, Deputy Coordinator (Training & Exercise), Arlington County Gigi Ragusa, Director, Center for Outcomes Research and Evaluation, University of Southern California; Manager of Education, CREATE Homeland Security Center Michael Randolph, Sector Security Director, Northrop Grumman Aerospace Systems Steve Recca, NPS Center for Homeland Defense and Security Roger Rieger, President/CEO, InfraGard Los Angeles Cheryl Santor, CGEIT, CISM, CISA, CISSP, Information Security Manager, Metropolitan Water District of Southern California Devra Schwartz, Director of Emergency Management and Administration, Loyola Marymount University Tim Sullivan, Rear Admiral, USCG (ret) Phillip Van Saun, Director, Risk, Security and Resilience, University of California, San Diego

6 Corporate and Custom Training UCLA Extension offers custom-designed programs to meet your company s training needs. We have partnered with companies and organizations around the world for over 25 years, including NASA, the City of Los Angeles, Boeing, Northrop Grumman, LAUSD, ITT, Metropolitan Transit Authority, Jet Propulsion Laboratory, and LADWP. We draw on our resources as part of the world-renowned UCLA, as well as over 90 years experience building courses and curricula, to collaboratively create customized educational programs at your location. Contact Our Corporate Programs Unit: customprograms@uclaextension.edu or (310) More information: uclaextension.edu/customprograms. The Risk, Security, & Resiliency Management Certificate curriculum is intended for: Supervisors, managers, directors of organizations Insurance industry and risk management professionals Importers/exporters Transportation providers Supply-chain managers Emergency managers Government agency employees (federal, state, local) Real estate and developers Academics Military personal returning from overseas Contact Us For more information about this certificate, including course selection advisement, record maintenance, transcript evaluations, and problem resolutions, call (310) , or bamcertificate@uclaextension.edu. Visit our website at uclaextension.edu/risk Le Conte Avenue, Suite 515, Los Angeles, CA uclaextension.edu/risk Not printed at state expense. Printed with green ink on recycled paper.

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS Good IT governance is a key element of a well-performing enterprise. Enterprises need qualified information

More information

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016 ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)

More information

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

E-guide CISSP Prep: 4 Steps to Achieve Your Certification CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access

More information

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online Make Your Statement Master of Management in Library and Information Science online Graduate Certificate in Library and Information Management online Help shape the future of your field. The Master of Management

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION 9 th ANNUAL A select group of C-suite panelists and key stakeholders will engage participants in dynamic discussion and debate about the transformational change taking place in today s energy industry.

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

Number: USF System Emergency Management Responsible Office: Administrative Services

Number: USF System Emergency Management Responsible Office: Administrative Services POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

a PennState A leader in online learning since 1998 Programs in Enterprise Architecture ~ World Campus A world of possibilities. Online.

a PennState A leader in online learning since 1998 Programs in Enterprise Architecture ~ World Campus A world of possibilities. Online. A leader in online learning since 1998 To learn more about programs in Enterprise Architecture, visit: worldcampus.psu.edu/psueabt Programs in Enterprise Architecture a PennState ~ World Campus A world

More information

Public and Private Interdependencies Filling a Gap in Most Continuity Plans

Public and Private Interdependencies Filling a Gap in Most Continuity Plans Public and Private Interdependencies Filling a Gap in Most Continuity Plans John A Jackson Executive Vice President Fusion Risk Management, Inc. The evolution of the continuity industrytechnology advancement

More information

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90 th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion

More information

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014 JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting

More information

Member of the County or municipal emergency management organization

Member of the County or municipal emergency management organization EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,

More information

PROFESSIONAL MASTER S IN

PROFESSIONAL MASTER S IN I m in a new job I love. ERIC LAFONTAINE Service Operations Manager GE Healthcare Class of 2013 PROFESSIONAL MASTER S IN APPLIED SYSTEMS ENGINEERING GAIN A COMPETITIVE EDGE WITH A GEORGIA TECH DEGREE TODAY

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

ENROLL NOW. for classes! FIRST COME FIRST SERVED SEATING IS LIMITED program includes:

ENROLL NOW. for classes! FIRST COME FIRST SERVED SEATING IS LIMITED program includes: Become Certified in Government Technology Leadership ENROLL NOW CERTIFIED GOVERNMENT C H I E F I N F O R M AT I O N O F F I C E R for 2017-18 classes! FIRST COME FIRST SERVED SEATING IS LIMITED CERTIFIED

More information

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident

More information

Community Resilience Innovation, Collaboration, Sustainability, Results. The Los Angeles Emergency Preparedness Foundation

Community Resilience Innovation, Collaboration, Sustainability, Results. The Los Angeles Emergency Preparedness Foundation Community Resilience Innovation, Collaboration, Sustainability, Results The Los Angeles Emergency Preparedness Foundation Community Resilience Life Cycle Community Resilience Framework Preparedness Dimensions

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career ce.uci.edu/infosec UCI Division of Continuing Education s professional certificate and specialized

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape

More information

Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents

Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents BHEF_Report_mk_050817_ms Acknowledgements This report is supported primarily by a grant from

More information

Business Continuity Planning

Business Continuity Planning Business Continuity Planning The Unexpected Happens Be Ready Copyright -Business Survival Partners, llc. 2011 - All Rights Reserved www.survivalpartners.biz RISK 2 Risks to National Security A secure and

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

Collaboration on Cybersecurity program between California University and Shippensburg University

Collaboration on Cybersecurity program between California University and Shippensburg University Collaboration on Cybersecurity program between California University and Shippensburg University Weifeng Chen Dept. of Math, Computer Science and Information Systems California University, California,

More information

Certified Manager Certification

Certified Manager Certification Certified Manager Certification Get Trained Get Certified Get Recognized www.hr-pulse.org In Partnership With HR Pulse has the Learning Solutions to Empower Your People & Grow Your Business About ICPM

More information

Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1

Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1 2016-2018 Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1 THE KU MSIT HANDBOOK 2 MS in Information Technology (MSIT) School of Engineering The University of Kansas According

More information

CIPP/G (Certified Information Privacy Professional US Government)

CIPP/G (Certified Information Privacy Professional US Government) CIPP/G (Certified Information Privacy Professional US Government) Course Description (image) The Certified Information Privacy Professional/Government (CIPP/G) is the first publicly available privacy certification

More information

The U.S. Manufacturing Extension Partnership - MEP

The U.S. Manufacturing Extension Partnership - MEP The U.S. Manufacturing Extension Partnership - MEP Roger D. Kilmer Director, MEP National Institute of Standards and Technology (NIST) U.S. Department of Commerce roger.kilmer@nist.gov 301-975-5020 http://www.nist.gov/mep/

More information

ENGINEERING AND TECHNOLOGY MANAGEMENT

ENGINEERING AND TECHNOLOGY MANAGEMENT Engineering and Technology Management 1 ENGINEERING AND TECHNOLOGY MANAGEMENT Master of Science in Engineering Technology Management Tim Hardin, PhD Director Brenda L. Johnson, MS Assistant Director OSU

More information

AAPA Smart Ports. Cyber Management for Ports Panel. Small Port Cyber Security Workshops. March 6, 2018

AAPA Smart Ports. Cyber Management for Ports Panel. Small Port Cyber Security Workshops. March 6, 2018 AAPA Smart Ports Cyber Management for Ports Panel Small Port Cyber Security Workshops March 6, 2018 1200 New Jersey Ave., SE Washington DC 20590 w w w. d o t. g o v Port Infrastructure Development More

More information

Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup.

Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup. Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved FlyntGroup.com Flynt Group White Paper Bundling Arrows: Making a Business

More information

Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning

Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning 2017 California Higher Education Collaborative Conference Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning Introductions Rick Blackburn,

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for

More information

Section One of the Order: The Cybersecurity of Federal Networks.

Section One of the Order: The Cybersecurity of Federal Networks. Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald

More information

INTRODUCING RESILIENT LOS ANGELES

INTRODUCING RESILIENT LOS ANGELES INTRODUCING RESILIENT LOS ANGELES Resilience is a value that guides everything we do in Los Angeles, because we know that the decisions we make today will shape the future our children and grandchildren

More information

NERC Staff Organization Chart Budget 2018

NERC Staff Organization Chart Budget 2018 NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

NASA Policy Directive

NASA Policy Directive NASA Policy Directive NPD 8820.2D Effective Date: July 02, 2013 Expiration Date: July 02, 2018 COMPLIANCE IS MANDATORY Subject: Design and Construction of Facilities Responsible Office: Facilities Engineering

More information

Table of Contents. Sample

Table of Contents. Sample TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...

More information

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable

More information

The premier internationally recognized certification in Facility management

The premier internationally recognized certification in Facility management international facility management The premier internationally recognized certification in Facility management association Top 5 Reasons to Get Certified 2 3 1. 2. 3. 4. 5. By achieving my CFM, I gained

More information

Mississippi Emergency Management Agency. Shawn Wise. Office Of Preparedness

Mississippi Emergency Management Agency. Shawn Wise. Office Of Preparedness Mississippi Emergency Management Agency Shawn Wise Mississippi Emergency Management Agency Office Of Preparedness All-Hazard Agency MEMA s Mission MEMA is a Coordinating Agency. State/Local Partnerships

More information

Building the Cybersecurity Workforce. November 2017

Building the Cybersecurity Workforce. November 2017 Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries

More information

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2019 NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate

More information

Systems Engineering Certificate Program

Systems Engineering Certificate Program Corporate Training Systems Engineering Certificate Program Accelerate Your Career extension.uci.edu/corporate In today s competitive business environment, leaders are appointed based on credentials and

More information

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC

More information

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability

More information

Security Management Occupations

Security Management Occupations Security Management Occupations Labor Market Analysis: San Diego County MARCH 2019 Summary To determine labor market demand for occupations that could be trained by a Security Management program, this

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

NERC Staff Organization Chart

NERC Staff Organization Chart NERC Staff Organization Chart President and CEO Administrative Associate Director to the Office of the CEO Associate Director, Member Relations and MRC Secretary Senior Vice President and Chief Reliability

More information

CITY OF MONTEBELLO SYSTEMS MANAGER

CITY OF MONTEBELLO SYSTEMS MANAGER CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

Business Continuity - An Inside Perspective

Business Continuity - An Inside Perspective Business Continuity - An Inside Perspective Tom McIlvaine Business Continuity Manager May 24, 2011 Agenda Where It All Begins Private Sector & Government Applicability Business Continuity Planning A Corporate

More information

CYBERSECURITY. The Intersection of Policy and Technology YOU RE HERE TO MAKE A DIFFERENCE ṢM

CYBERSECURITY. The Intersection of Policy and Technology   YOU RE HERE TO MAKE A DIFFERENCE ṢM CYBERSECURITY The Intersection of Policy and Technology WWW.HKS.HARVARD.EDU/EE/CYBER YOU RE HERE TO MAKE A DIFFERENCE ṢM CYBERSECURITY THE INTERSECTION OF POLICY AND TECHNOLOGY In a world with almost limitless

More information

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2019 NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

Capabilities Statement

Capabilities Statement GOVERNMENT INDUSTRY CORPORATE HEALTHCARE Capabilities Statement San Francisco Corporate HQ 419 Mason Street, Suite 207 Vacaville, CA 95688 Chicago 953 ½ Logan Avenue Belvidere, IL 61008 New York 42 Manor

More information

Building a BC/DR Control Library and Regulatory Response Program

Building a BC/DR Control Library and Regulatory Response Program Building a BC/DR Control Library and Regulatory Response Program David Garland, Senior Director, Disaster Recovery & Regulatory Compliance, Business Continuity Management CME Group Regulatory Compliance

More information

2018 Annual Report. Colorado Emergency Preparedness Partnership (CEPP)

2018 Annual Report. Colorado Emergency Preparedness Partnership (CEPP) 2018 Annual Report Colorado Emergency Preparedness Partnership (CEPP) Colorado Emergency Preparedness Partnership (CEPP) https://thecepp.org/index.html Who We Are The Colorado Emergency Preparedness Partnership

More information

The Widening Talent Gap: The greatest security challenge of our time

The Widening Talent Gap: The greatest security challenge of our time INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016 General Information Share the webinar

More information

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

Security Survey Executive Summary October 2008

Security Survey Executive Summary October 2008 A government technology Executive Survey Summary: HP Security Survey Executive Summary October 2008 Produced by: In Partnership With: Introduction Information is paramount to the survival of government

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

NERC Staff Organization Chart Budget 2017

NERC Staff Organization Chart Budget 2017 NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel

More information

Mississippi Emergency Management Agency. Brittany Hilderbrand & Kamika Durr. Office Of Preparedness

Mississippi Emergency Management Agency. Brittany Hilderbrand & Kamika Durr. Office Of Preparedness Mississippi Emergency Management Agency Brittany Hilderbrand & Kamika Durr Mississippi Emergency Management Agency Office Of Preparedness All-Hazard Agency MEMA s Mission MEMA is a Coordinating Agency.

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery

Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery Dave Komendat Chief Security Officer The Boeing Company What We Do Today Design, assemble and support

More information

From Hyogo to Sendai. Anoja Seneviratne Disaster Management Centre

From Hyogo to Sendai. Anoja Seneviratne Disaster Management Centre From Hyogo to Sendai Anoja Seneviratne Disaster Management Centre Milestone Event in the Year 2015 New York in September 2015 to World Conference define voluntary on Disaster Risk Sustainable Reduction

More information

HOTEL RESILIENT Plan ahead stay ahead. With support from the German Government through

HOTEL RESILIENT Plan ahead stay ahead. With support from the German Government through HOTEL RESILIENT Plan ahead stay ahead With support from the German Government through WHAT CAN GO WRONG WILL GO WRONG Murphy s Law More than 40% of hotels do not reopen after large disasters FEMA 2010

More information

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED

More information

Developed and Prepared by Institute for Digital Business Strategy (IDBS) Brackenfell, Cape Town South Africa

Developed and Prepared by Institute for Digital Business Strategy (IDBS) Brackenfell, Cape Town South Africa Certificate, Diploma and Online Digital Transformation Education covering Innovation, Opportunity Management, Systems Engineering, Management, Technology and Digital Analytics Developed and Prepared by

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning

More information

Oracle Buys Automated Applications Controls Leader LogicalApps

Oracle Buys Automated Applications Controls Leader LogicalApps Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning

More information

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents

More information

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com Spread your wings Professional qualifications and development at Deloitte What impact will you make? careers.deloitte.com It s your future. How far will you take it? Do you want to make an impact in your

More information

NERC Staff Organization Chart Budget 2017

NERC Staff Organization Chart Budget 2017 NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel

More information

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:

More information

National Defense University and IRMC. National Defense University

National Defense University and IRMC. National Defense University The Forgotten Information Assurance Professional - Educating the Senior IT Manager Robert C. Norris, Jr. Information Resources Management College National Defense University 1 Overview Intro to IRMC and

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

Call for Expressions of Interest

Call for Expressions of Interest Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

California Cybersecurity Integration Center (Cal-CSIC)

California Cybersecurity Integration Center (Cal-CSIC) California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine

More information