CS8803 Enterprise Cybersecurity Management

Georgia Institute of Technology


Course Information

Course Delivery

In-person and OMS

Description

This course is intended for students with an interest in designing and leading cybersecurity organizations or operating in functions that need to work closely with security teams. Beginning with a focus on strategy and guiding principles, the course then moves into organizational structure and specific roles and duties required to address the cybersecurity needs of different organizations. Core concepts of risk management are introduced and used to frame modules on cyber risk management and oversight. Finally, cyber risk governance is studied with a focus on both internal oversight structures and Board-level interaction.

Prerequisites

none

Instructor and TA Information

Instructor Information

Name: Jerry Perullo

Office Location: TBD

Office Hours: TBD

Email: perulloz@ngatech.edu

Grading

Overview

Component

Undergraduate Percentage

Graduate Percentage

Participation

10

10

Exams (3 total)

60 (20% each)

40 (13.3% each)

Final Exam

30

30

Case Studies (Masters-level Only - 2 total)

N/A

20% (10% each)

Participation

Participation will include:

Grading Scale

Your final grade will be assigned as a letter grade according to the following scale:

A        90-100%

B        80-89%

C        70-79%

D        60-69%

F        0-59%

Pass/Fail

My information on pass/fail is limited to the public link below, so be sure you understand any implications. That said, from my point of view I approve you selecting pass/fail more and for a passing mark I'll require the equivalent grade of a 60/100 or better, which should be easy to accomplish. I'd thus recommend taking the exams and submitting the case studies, but you can calculate your grade and determine if omitting any case study or exam is mathematically inconsequential, in which case I would harbor absolutely zero resentment for you skipping it!

https://catalog.gatech.edu/policies/grading-gpa/pass-fail-system-rules/

Course Goals and Outcomes

Upon successful completion of this course, students will be able to:

  1. Identify the key components of an enterprise Cybersecurity Strategy
  2. Identify the 10 Threat Objectives and map recent cybersecurity events to the corresponding adversary objective
  3. Propose an organizational model for an information security department
  4. Identify the core components of risk triage and rating
  5. Recognize the components of prevailing cybersecurity legislation and regulation
  6. Identify key methodologies and outcomes for successful application security assessment and red team testing
  7. Propose an internal governance structure for an enterprise security program
  8. Identify the top goals and outcomes for Board-level cybersecurity oversight

Reading Material

Selected online readings

Exam Policy:

There will be three in-class exams, as indicated above. The final exam will be given at the scheduled time during exam week. Cell phones, laptops and other electronic items must be turned off and placed in a container such as a backpack or purse such that they are inaccessible to you during exams unless specified otherwise. Students registered with Disability Testing Services (DTS) may opt to take their exams at DTS rather than in the classroom, provided sufficient advance notice is given.

Office of Disability Statement:

Georgia Tech is committed to a climate of mutual respect and full participation. Our goal is to create learning environments that are usable, equitable, inclusive and welcoming. If there are aspects of this course that result in barriers to your learning or accurate assessment thereof, please notify me as soon as possible. Students with disabilities should contact the Office of Disability Services to discuss options for all relevant accommodations. ODS can be reached at 404 894 2563, dsinfo@gatech.edu, or disabilityservices.gatech.edu .

Academic Honor Code:

Students are expected to act according to the highest ethical standards. Academic misconduct is any act which does or could improperly distort student grades or other student academic records. Such acts include but are not limited to the following:

Institute Absence Policy:

All students are expected to attend class and final examinations. Although it is recognized that occasionally it may be necessary for students to be absent from scheduled classes or laboratories for personal reasons, students are responsible for all material covered in their absences, and they are responsible for the academic consequences of their absences. Students should discuss planned absences with me as soon as possible after the beginning of an academic term. When prior notice of absence is given, or in cases of sickness-related absence, late work will be accepted for full credit if submitted within a reasonable time frame.

Communications:

Verbal notices may be given in class. It is your responsibility to obtain this information in class. If you are not present, you must get this information from other students. Notices and other communications may also be delivered via email or Canvas; read your email and check Canvas regularly.

Topical Outline

Week

Topic

Deliverables (exams during the second half of class) (case studies 8803/graduate only)

Reading (after week 1 expected before class)

Module 1:  Strategy

Week 1

Aug 22, 24

Strategy Composition

Getting Started with the NIST Cybersecurity Framework: A Quick Start Guide

https://csrc.nist.gov/Projects/cybersecurity-framework/nist-cybersecurity-framework-a-quick-start-guide

Week 2

Aug 29, 31

Threat Objectives

What are they after? A threat-based approach to cybersecurity risk management

https://www.linkedin.com/pulse/what-after-threat-based-approach-cybersecurity-risk-jerry-perullo/

Week 3

Sep 7

Departmental Organization

Three Lines Model - https://na.theiia.org/about-ia/PublicDocuments/Three-Lines-Model-Updated.pdf

Cybersecurity in the Three Lines model

https://www.linkedin.com/pulse/cybersecurity-three-lines-model-jerry-perullo/

Week 4

Sep 12, 14

Talent Management

Complete a sample employment quiz

(Ungraded/participation only; survey link TBD)

Bad CISO Archetypes

https://www.linkedin.com/pulse/draft/AgHntK4Etj6fGgAAAX5F4o6db9_kM4aEIA-Ll3bPveZAmL423wB7hCUFg_F4egU0cvmu7Zo

Week 5

Sep 19, 21

Cyber Threat Intelligence

Exam 1: Strategy

Speaker

Module 2:  Cybersecurity Operations/span>

Week 6

Sep 26, 28

Architecture and Automation

Log4J and egress LinkedIn post and discussion

https://www.linkedin.com/posts/perullo_adversarial-cybersecurity-reality-activity-6875174587668148224-QI4C

Week 7

Oct 10, 12

Cyber Incident Response & Examples

Value of the True Positive

https://www.linkedin.com/pulse/draft/AgH9Xhg4nT3npwAAAX5F594nPAHEz-TIp1NDY26oe7tkfZfI2ARgITjROnl6nAyhvAR0haU

Week 8

Oct 19

Cyber Incident Response & Examples cont.

Case Study 1 due Oct 19

Exam 2 Oct 19: Cybersecurity Operations

Module 3:  Security Assurance

Week 9

Oct 24, 26

GRC - Risk Register Management

Week 10

Oct 31, Nov 2

GRC - Compliance

Cybersecurity for Investor Relations and Corporate Governance

https://www.linkedin.com/pulse/cybersecurity-investor-relations-corporate-governance-jerry-perullo

Week 11

Nov 7, 9

GRC - Reporting and Metrics

Briefing Your Board on Cybersecurity part 3/3: Board Committees - Metrics and Materials

https://www.linkedin.com/pulse/briefing-your-board-cybersecurity-part-33-committees-jerry-perullo/

Week 12

Nov 14, 16

Application Security & Red Teaming

It's not the MFA, it's the OTP!

https://www.linkedin.com/pulse/its-2fa-1tp-jerry-perullo/

Week 13

Nov 21

Application Security & Red Teaming cont.

Exam 3 Nov 21: Security Assurance

Module 4:  Governance

Week 14

Nov 28. 30

Internal Cyber Governance

Case Study 2 due April 21

CyberGov Charter & Handbook

https://www.linkedin.com/pulse/draft/AgG0kNHppjbIeAAAAX5F8CcXj1N-WzroddM2AaHbYAnaqxTn59iEL-J2Szd7yxXysvg5xCk

Week 15

Dec 5

External/Board Cyber Governance

Cumulative Final Exam:

TBD

Briefing Your Board on Cybersecurity Part 1/3: Corporate Governance 101 for Security Professionals

https://www.linkedin.com/pulse/briefing-your-board-cybersecurity-part-13-corporate-101-jerry-perullo/

Briefing Your Board on Cybersecurity part 2/3: Full Board Meetings

https://www.linkedin.com/pulse/briefing-your-board-cybersecurity-part-23-full-meetings-jerry-perullo/

Cybersecurity for Investor Relations and Corporate Governance

https://www.linkedin.com/pulse/cybersecurity-investor-relations-corporate-governance-jerry-perullo/