Course

Danger from Within – Cybersecurity and Governance
The greatest threat to cybersecurity may be employees or vendors

Recent research at Oxford University and a 2014 Harvard Business Review article observed cyberattacks involving insiders – employees, vendors, consultants  and others connected to the organization’s computer system – as pernicious and on the rise … accounting for 20% of all cyberattacks. Further, research indicates that widely used safeguards are ineffective against them. This course examines where counties are most vulnerable and best practices to significantly reduce the risk of unintended release of county data and information. The focus is on establishing effective and practical policies and procedures for reducing vulnerability, and reviewing the governance of county IT systems. Course highlights steps managers, executives and elected officials should consider to ensure security of county and client information. Ideal for managers, executives, elected officials as well as those managing IT systems and system security.

Instructors:  Cybersecurity experts from Dell Computer and Pay Per Cloud.

Navigation Term Highlight

Where We are Located

Navigation Term Highlight

Our 58 Counties