What cyber threats might your company realistically face today? How will you orchestrate the resources at your disposal to defend against them? Cybersecurity Cases teaches you to take an active role in setting and participating in cybersecurity strategy within your organization. Through deep engagement with real-world case studies, you will learn to create a strategic assessment strategy to optimize your capabilities and prioritize your spend; analyze the validity, value and reliability of threat intelligence; proactively detect and mitigate cyber risks when conducting new business initiatives and transactions; and effectively employ automation and orchestration.
No Mandatory Login Times
4-6 Hours of Work per Module
“You’ve been building and developing your cybersecurity team, and now you’re ready to optimize it. This course will open your eyes to the tactics of sophisticated threat groups and give you the advanced techniques and tools for defending against them.”
Critically analyze and vet paid threat intelligence to be used in your company. Curate and package threat intelligence for business leaders. Develop a clear framework for assessing the reliability and validity of open-source intelligence.
Provide suggestions for resolving dilemmas in a case study on the topic of financially motivated attack groups. Predict the potential consequences of attacks on retail, restaurant and hospitality sectors. Identify the preliminary courses of action taken to infiltrate computer systems. Explain the consequences of the types of attacks launched by FIN 7.
Prioritize the evaluative criteria for assessing new and existing cybersecurity plans. Identify symptoms and warning signs of an attack early in the life cycle. Analyze the people, processes and technologies needed to build an internal red team function. Determine the best methods for revising and strengthening existing strategies.
Provide suggestions for resolving dilemmas in a case study on securing information and data. Predict the potential consequences of a supply chain cyber attack on a hypothetical company. Identify the preliminary courses of action taken to infiltrate computer systems. Explain the consequences of a supply chain attack.
Identify repeatable processes for efficiency within your organization or industry. Identify the best methods for integrating and validating the strength of security tools within your automative process. Consider the people, processes and technologies for integrating security tools. List the steps for automating security processes and the procedures for detecting and resolving attacks.
Decide how to resolve an application security attack. Predict the potential consequences of an application security eCommerce attack on a hypothetical company. Identify the preliminary courses of action taken to infiltrate computer systems. Explain the consequences of an eCommerce attack.
Summarize how to leverage resources (people, products, services, funds) for incorporating a cybersecurity plan into your new business initiative. Design a preventative strategy for ensuring the protection of customer data and information. Assess risk in a merger and acquisition transaction.
Identify the preliminary courses of action taken to infiltrate computer systems. Explain the consequences of a critical infrastructure attack. Provide suggestions for recovering from a critical infrastructure attack on a company.
Learn about security information and event management (SEIM), traffic light protocol (TLP) and more. Enroll in Cyber Threat Intelligence from EmergingEd.
Learn cloud security strategies and tips for securing data and digital assets during cloud deployment. Enroll in Cloud Security from EmergingEd.
Learn key cybersecurity training strategies and develop an effective incident response plan. Enroll in Cybersecurity Risks and Industry from EmergingEd.
Learn about security information and event management (SEIM), traffic light protocol (TLP) and more. Enroll in Building a Threat Hunting Capability from EmergingEd.
Jeffrey Groman, founder of Groman Consulting Group, is dedicated to helping organizations identify and resolve their greatest cybersecurity risks. Mr. Groman has worked in the security field for more than 20 years. As a cybersecurity consultant, he has guided major corporations, including banks, insurance companies and software providers through risk prevention and rapid response to incidents and security breaches.
Mr. Groman is certified in forensic analysis and application security, and previously worked with Mandiant Security Consulting Services and FireEye, providing strategic and incident response consulting to security teams and educating executives through delivery of SOC assessments. In these roles, Mr. Groman led a team of consultants and functional experts in working with a wide range of clients across multiple verticals, including NYC Health and Hospitals, Blue Cross Blue Shield Association, Ameriprise Financial, American Express, Ally, Huntington National Bank, Eaton, Caterpillar, DST Systems, Sprint and TransAmerica.
Mr. Groman is passionate about cybersecurity and partnering with clients to find solutions to complex issues. His book “Avoid These 11 Pitfalls and Minimize the Pain of Your Next Data Breach” is designed to help organizations learn from his decades of real-world experience. He has presented at Information Systems Security Association (ISSA) International, NetSecure, and Infragard conferences; briefed boards of directors; conducted tabletop exercises and workshops; and helped clients build security processes to be better prepared for the inevitable.
Mr. Groman has a BS in Electrical and Computer Engineering from the University of Colorado, Boulder.