Sign up if...

  • You're responsible for cybersecurity

  • You're a business owner, leader, Board member, or in the C-Suite

  • You're interested in a career in cybersecurity

  • You just want to understand it to keep yourself and data protected

This program is meant to empower business owners by sharing information you can trust from a traditionally guarded industry, therefore enabling you to reach success- independently.

If you’re searching for a transparent, vast source of cybersecurity expertise, you’ve come to the right place.

Put me on the wait list!

Yes, I'm interested

Curriculum

  • 1

    Introduction

    • Welcome!

    • 7 wrong assumptions about cybersecurity

    • What's included, walk through the curriculum

    • About your instructor

    • How to navigate the training and be successful in taking it

  • 2

    Overview

    • Get the juices flowing

    • Cybersecurity defined

    • Who are the bad actors?

    • How do the bad actors get in?

    • How to keep the bad actors out?

    • Historic breaches and what they teach us

    • Poll

    • How did this mess get created anyway?

    • Test your learning

    • Put it into action

  • 3

    Threats & Attacks

    • Top threats

    • Who's responsible for cybersecurity?

    • Man in the Middle

    • Phishing & Spearphishing

    • Drive-by

    • Botnets

    • Social Engineering

    • SQL Injection

    • Malware

    • Cross-Site Scripting

    • Passwords

    • Denial of Service (or Dos or DDos)

    • Insider

    • Eavesdropping

    • Ransomware

    • Test your learning

  • 4

    Programs

    • So what do we do?

    • Introduction to Programs

    • You can't protect what you don't know you have

    • Data is the primary target

    • It's all about risk

    • A great place to start

    • Training and awareness

    • Build with security in mind

    • Lock it down

    • Be ever vigilant to proactively monitor

    • Hit security incidents head on

    • Don't let your vendors ruin it for you

    • Test your learning

  • 5

    Frameworks

    • You don't have to start from scratch or re-invent the wheel

    • NIST CSF

    • ISO 27001

    • PCI DSS

    • FFIEC

    • HITRUST

    • SOC 2

    • Test your learning

  • 6

    Victimized

    • What to do?

    • Isolate the impact

    • Get back online

    • Eliminate the threat

    • Not have it happen again

    • Who do you have to tell?

    • Preparation is key

    • Test your learning

  • 7

    Conclusion

    • And yes there's so much more

    • Test your learning

    • Thank you, and parting thoughts!

    • Course evaluation

Meet Cheri-Your Cybersecurity Expert Help

CPA, MBA, BCC, CISSP

Cheri Hotman

Cheri's drive to succeed began when she graduated with an MBA from the University of Texas at Dallas and has only grown since then. With a Corporate career to the Vice President level predominately in banking, financial services, and consulting, she has a firm grasp on the particulars of the business world, making her even more informed and effective in cybersecurity. Cheri is a CPA, meaning she can both perform SOC 2 audits and help companies prepare for them. She is a BCC (Board Certified Coach), and holds her CISSP- the gold standard in cybersecurity.

Put me on the wait list!

Yes, I'm interested