Certificate and Test Prep Offerings
- Sign up and get started today. The online portal delivers coursework and maps progress to completion—all in place.
- Butler Execution Education provides documentation to meet tuition reimbursement needs.
Cyber Risk Management Certificate
Many executives are declaring cyber as the risk that will define our generation.
- Dennis Chesley, Global Risk Consulting Leader, PwC
Butler Executive Education and The Lucas College and Graduate School of Business at San Jose State University have joined forces to offer the Cyber Risk Management Certificate. Backed by accredited experts who understand how to effectively manage, implement, and communicate risk management models company-wide, this certificate offers a powerful collaboration with San José State University’s wealth of cybersecurity knowledge and Butler University’s programming in risk and insurance. Together, these two universities bring a proficient curriculum that gives certificate recipients the expertise to build and maintain a comprehensive cyber risk management program.
The Emergence of Cyber Risk
What was once solely an IT issue, cyber risk management now impacts the entire lifecycle of an organization. Large consumer breaches and political investigations have put cybersecurity in the forefront of the general public. Increasing digital operations have added pressure for executive teams to effectively navigate and protect their companies and consumers from cybersecurity breaches. Unlike many free training options, the Butler Executive Education and San José State University Cyber Risk Management Certificate is highly tailored to the needs and busy schedules of today’s professionals. This certificate provides a concise, self-paced overview of current cyber risk management trends, tools, and techniques – and how to easily apply them within any organization. Earn a cyber risk certificate for a one-time fee of $1,995 and 3-10 hours per module to complete.
Get the Skills You Need
- Understand categories of pure risk and cyber risk faced by various entities.
- Identify and prioritize specific 3rd party errors and omissions and liability risks resulting from IT premises, products, operations, and consulting for treatment.
- Read and interpret cyber risk insurance policies and coverage
- Price specific insurance risks
- Gain organizational buy-in and reporting to c-suite on cyber risk management.
- Reduce overall cost of risk to an organization.
- Determine when to use certain risk management tools and models
- Build and implement a Factor Analysis of Information Risk (FAIR) Roadmap.
Managing Cyber Risk Organizationally
Adopting a cyber risk management approach changes the role of cybersecurity from “gatekeeper” to “business enabler.” But to be successful, cyber risk management requires buy-in and participation at all levels of the organization – from IT and security staff to managers and C-suite. Financially, cyber risk management enables efficient allocation of cybersecurity dollars by focusing security efforts on the resources and goals the organization values most. This prioritization provides the greatest per dollar reduction in the organization’s cyber exposure - the biggest “bang” for the organization’s cybersecurity “buck.”
- Understanding specific types of risk management and risk mitigation techniques.
- Total cost of risk and objective of risk management.
- Communicating cyber risk management value to an organization and ROI.
- Ability to identify and prioritize specific 1st party property, equipment, inventory, and risks for treatment.
- Ability to identify and prioritize specific 3rd party E&O and liability risks resulting from products, operations, and consulting for treatment.
- Underwriting property, liability, and cyber exposures.
- How to price specific insurance risks.
- How to get cyber insurance based on organizational needs.
- Where and how buy insurance and the global insurance market.
- How to read and interpret cyber risk insurance policies and coverage.
- Managing overall risk and cyber risk.
- Understanding the roles of different stakeholders in the organization’s cybersecurity posture.
- When to use certain risk management tools and models.
- Decision-making lifecycle leading toward a reasonable standard of care in cybersecurity.
- Using risk analysis to support decisions.
- Defining and describing risks as quantifiable loss scenarios.
- Estimating risk factors with and without complete information.
- Using risk modeling tools (FAIR Risk Analysis Tool).
- Resolving disputes when professionals disagree.
- Support community, additional information sources, next professional development steps.