Elena Kvochko serves as Chief Trust Officer at SAP and is a Board Director at Refugees International. At Cornell, Professor Kvochko teaches a graduate-level Cybersecurity for Business Organizations course. She has held senior executive leadership positions across banking and financial services, cloud, and software development industries, including previous roles as Senior Vice President and Technology Executive at Bank of America and as a divisional Chief Information Officer at Barclays Bank. An inventor with award-winning expertise in technology, digital transformation, and cybersecurity, Professor Kvochko has invented patent-pending technologies in cybersecurity, privacy, and secure financial technologies.
Being able to evaluate the overall security status of your organization's product, sites, or teams at any point is critical, and conducting a thorough and applicable risk analysis is the key to this strategy.
In this course, you will assess an organization's security status to determine strengths and weaknesses. You will be introduced to the concept of security posture, and you will consider key areas to focus on when analyzing an existing security posture. You will also determine the best set of controls to strengthen security and better support weak spots to protect your organization. Finally, you will gain strategies for implementing future controls to protect your company, setting you up for success in risk analysis and planning efforts.
You are required to have completed the following courses or have equivalent experience before taking this course:
- Analyzing Cybersecurity Threats
- Assessing Cybersecurity Company Controls
Key Course Takeaways
- Identify the strengths and weaknesses of a company's existing security posture
- Determine the best set of controls to strengthen security and better support weak spots to protect an organization
- Implement controls to defend against cybersecurity threats and attacks
How It Works
Who Should Enroll
- C-suite executives
- Directors and managers
- Cybersecurity and privacy professionals
- Security analysts
- Product and transformation leaders
- Veterans and others returning to the workforce