We may earn an affiliate commission when you visit our partners.
Course image
Bobby Rogers
Most people know that information security is about protecting information systems and data, managing cyber risk, and ensuring compliance with governance. However, the security function of a business is also a business function unto itself. It is managed like any other business function, whether it involves staffing with qualified personnel, tracking projects, or managing the security budget. In this course, Running the Business of Information Security, you will learn your key to getting the focused knowledge you need to have, both for the real world and advanced certification exams. First, you’ll explore preparing budget requests...
Read more
Most people know that information security is about protecting information systems and data, managing cyber risk, and ensuring compliance with governance. However, the security function of a business is also a business function unto itself. It is managed like any other business function, whether it involves staffing with qualified personnel, tracking projects, or managing the security budget. In this course, Running the Business of Information Security, you will learn your key to getting the focused knowledge you need to have, both for the real world and advanced certification exams. First, you’ll explore preparing budget requests based upon programmed organizational security needs. You’ll also learn how to manage the security budget and other resources to their maximum effectiveness. Next, this course will show you how to create business cases to justify security investments and expenditures to support the business mission and goals. You’ll also learn how to manage a dynamic budget based upon changing cybersecurity and business risk. Finally, you’ll discover how to prepare, present, and report security budget status to include expenditures, investments, and other critical budget information. By the end of this course, you’ll have the advanced knowledge you need to help you manage the cybersecurity program’s budget in your organization, as well as to help pass advanced cybersecurity management certification exams.
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Provides foundational knowledge about managing budgets in information security programs
Suitable for individuals looking to strengthen their understanding of the business aspects of information security
Taught by Bobby Rogers, a recognized expert in cybersecurity
Helps prepare for advanced cybersecurity management certification exams
Requires prior knowledge in information security management
May be less relevant for individuals with less than 3 years of experience in the field

Save this course

Save Running the Business of Information Security to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Running the Business of Information Security. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Running the Business of Information Security will develop knowledge and skills that may be useful to these careers:
Director of Information Security
Directors of Information Security (CISOs) are responsible for overseeing the information security program of an organization. This course would be helpful, as it teaches how to prepare, present, and report security budget status to include expenditures, investments, and other critical budget information. This can help CISOs communicate the value of the information security program to senior management and ensure that the organization is getting the most value for its investment.
Information Security Manager
Information Security Managers are responsible for planning, implementing, and managing the information security program of an organization. This course would be helpful, as it teaches how to prepare, present, and report security budget status to include expenditures, investments, and other critical budget information. This can help Information Security Managers communicate the value of the information security program to senior management and ensure that the organization is getting the most value for its investment.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting an organization's computer systems and networks from cyber attacks. This course would be helpful, as it teaches how to manage a dynamic budget based upon changing cybersecurity and business risk. This can help Cybersecurity Analysts make informed decisions about how to allocate funds for cybersecurity and ensure that the organization is protected from cyber threats.
Security Analyst
Security Analysts are responsible for monitoring and analyzing an organization's security systems for potential threats. This course would be helpful, as it teaches how to create business cases to justify security investments and expenditures to support the business mission and goals. This can help Security Analysts develop a strong case for investing in information security and ensure that the organization is getting the most value for its money.
IT Security Specialist
IT Security Specialists are responsible for protecting an organization's computer systems and networks from cyber attacks. This course would be helpful, as it teaches how to create business cases to justify security investments and expenditures to support the business mission and goals. This can help IT Security Specialists develop a strong case for investing in information security and ensure that the organization is getting the most value for its money.
Information Security Auditor
Information Security Auditors are responsible for assessing the security of an organization's computer systems and networks. This course would be helpful, as it teaches how to prepare, present, and report security budget status to include expenditures, investments, and other critical budget information. This can help Information Security Auditors communicate the value of the information security program to senior management and ensure that the organization is getting the most value for its investment.
Information Technology Audit Manager
Information Technology Audit Managers are responsible for planning, implementing, and managing the IT audit function of an organization. This course would be helpful, as it teaches how to create business cases to justify security investments and expenditures to support the business mission and goals. This can help Information Technology Audit Managers develop a strong case for investing in information security and ensure that the organization is getting the most value for its money.
Risk Manager
Risk Managers are responsible for identifying, assessing, and managing the risks of an organization. This course would be helpful, as it teaches how to create business cases to justify security investments and expenditures to support the business mission and goals. This can help Risk Managers develop a strong case for investing in information security and ensure that the organization is getting the most value for its money.
IT Manager
IT Managers are responsible for planning, implementing, and managing the IT systems of an organization. This course would be useful, as it helps build a foundation of knowledge in security budgeting and resource management. This can help IT Managers make informed decisions about how to allocate funds for IT security and ensure that the organization is protected from cyber threats.
Budget Analyst
Budget Analysts keep track of finances and determine how to spend money across a business. This course, Running the Business of Information Security, would be helpful, as it teaches how to manage the security budget and other resources to their maximum effectiveness. This can help Budget Analysts make informed decisions about how to allocate funds and ensure that the organization is getting the most value for its money.
Compliance Manager
Compliance Managers are responsible for ensuring that an organization complies with all applicable laws and regulations. This course would be helpful, as it teaches how to create business cases to justify security investments and expenditures to support the business mission and goals. This can help Compliance Managers develop a strong case for investing in information security and ensure that the organization is meeting its compliance obligations.
Information Security Consultant
Information Security Consultants provide advice and guidance to organizations on how to improve their information security posture. This course would be useful, as it helps build a foundation of knowledge in security budgeting and resource management. This can help Information Security Consultants make informed recommendations to clients about how to allocate funds for security and ensure that they are getting the most value for their money.
Finance Manager
Finance Managers are responsible for planning, implementing, and managing the financial activities of an organization. This course would be helpful, as it teaches how to create business cases to justify security investments and expenditures to support the business mission and goals. This can help Finance Managers develop a strong case for investing in information security and ensure that the organization is getting the most value for its money.
Computer and Information Systems Manager
Computer and Information Systems Managers are responsible for planning, implementing, and managing the information technology (IT) systems of an organization. This course would be useful, as it helps build a foundation of knowledge in security budgeting and resource management. This can help Computer and Information Systems Managers make informed decisions about how to allocate funds for IT security and ensure that the organization is protected from cyber threats.
Network Administrator
Network Administrators are responsible for maintaining and managing the computer networks of an organization. This course would be useful, as it helps build a foundation of knowledge in security budgeting and resource management. This can help Network Administrators make informed decisions about how to allocate funds for network security and ensure that the organization is protected from cyber threats.

Reading list

We haven't picked any books for this reading list yet.
Martin Gill's book provides an overview of the international legal framework for cyber security risk management. With well-regarded expertise in this area of law, Gill's book is an excellent resource.
Explores insider threats to cybersecurity, providing guidance on how to prevent, detect and respond to these threats.
An advanced text on information security risk management, Thomas Peltier's book covers concepts, methods, and tools for managing information security risks.
From the National Institute of Standards and Technology lays out their Cybersecurity Framework. The text explores how organizations can implement the Framework to improve their cybersecurity posture.
While this book does not focus specifically on cybersecurity risk management, it provides an overview of enterprise risk management. Many of the concepts discussed can be applied to cybersecurity risk management.
While this book does not focus specifically on cybersecurity risk management, it provides a comprehensive overview of risk management. can help readers understand the fundamentals of risk management that can be applied to cybersecurity risk management.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser