Course description

You have spent time designing, developing, and testing your web-facing product and have released it into a would of ever-changing and constantly more aggressive cyber threats. How do you know if you can handle a data breach or a cybersecurity compromise? How do you continue to protect the data your application processes and keep your application available and secure, and how do you prove this to your customers? Thanks to the President's Executive Order (EO) 14028 on Improving the Nation's Cybersecurity and the anticipated US Securities and Exchange Commission ruling, this is getting harder and harder (or at least more time consuming). In this course, we work through the steps to secure your product, including the processes and tools needed to do so, and how to generate the evidence that you and your customers need in order to have a level of assurance that the necessary and appropriate data protection is in place.


You may also like