• Home
  • Membership
  • Research
  • Conferences
  • Programs
  • Pedagogy
  • CIO/CISO Forum
  • Career
  • Statistics
  • Case Competition
  • Contact Us
  • More
    • Home
    • Membership
    • Research
    • Conferences
    • Programs
    • Pedagogy
    • CIO/CISO Forum
    • Career
    • Statistics
    • Case Competition
    • Contact Us
  • Home
  • Membership
  • Research
  • Conferences
  • Programs
  • Pedagogy
  • CIO/CISO Forum
  • Career
  • Statistics
  • Case Competition
  • Contact Us

scope

Cybersecurity Defined

ACM/IEEE/AIS/IFIP Joint Task Force 2015

“A computing-based discipline involving technology, people, information, and processesto enable assured operations.  It involves the creation, operation, analysis, and testing of secure computer systems. It is an interdisciplinary course of study, including aspects of law, policy, human factors, ethics, and risk management in the context of adversaries.” 

Information Security Defined

Anderson (2003)

A well-informed sense of assurance that information risks and controls are in balance.  

Cybersecurity Management topics

Cybersecurity Governance

Cybersecurity Governance

Cybersecurity Governance

Cybersecurity Strategy

Cybersecurity Governance

Cybersecurity Governance

Cybersecurity Policy

Cybersecurity Governance

Cybersecurity Policy

Risk Management

Business Continuity Planning

Cybersecurity Policy

Cybersecurity Planning

Business Continuity Planning

Business Continuity Planning

Business Continuity Planning

Business Continuity Planning

Business Continuity Planning

Cyber Resiliency

Security Education, Training and Awareness

Security Education, Training and Awareness

Security Education, Training and Awareness

Security Education, Training and Awareness

Security Education, Training and Awareness

Organizational Cyber Security

Security Education, Training and Awareness

Organizational Cyber Security

Security Standards

Cybersecurity Management Models & Methodologies

Organizational Cyber Security

Cybersecurity Management Models & Methodologies

Cybersecurity Management Models & Methodologies

Cybersecurity Management Models & Methodologies

Economics of Cybersecurity

Cybersecurity Management Models & Methodologies

Cybersecurity Management Models & Methodologies

Customers have questions, you have answers. Display the most frequently asked questions, so everybody benefits.

Available upon membership

Guidance on Cybersecurity Management programs

Receive expert guidance on developing Cybersecurity Management programs and curriculum. 

Directory of Cybersecurity Management Education

A whitepaper on the top baccalaureate, masters, doctoral and executive programs, as well as, detailed faculty, curriculum and tuition information. (Availability subject to development)

Cybersecurity Management Program Toolkit

Receive template to develop cybersecurity management Program. The toolkit includes different course structure and program outcomes. 

Course Toolkit (Annual dues)

Access to learning outcomes and syllabi for multiple courses on Cybersecurity Management at graduate and undergraduate level  (as developed).  

NSA/DHS Center of Academic Excellence (Annual dues)

Program and Course mapping to support NSA/DHS Center for Academic Excellence - Cyber Defense designations (subject to development). 

Faculty Development (Annual Dues)

CMC will provide faculty mentorship opportunities. This is specially useful for new faculty entering our field or about to teach their first cybersecurity courses. Experienced practitioners who become Adjunct Faculty can benefit by learning about pedgogical issues and best practices on teaching effectively. 

Copyright © 2024 Cybersecurity Management Council - All Rights Reserved.