Course MGT-473

Instructor-Led Training (Live)

Organizational Cybersecurity Information Sharing

Length
0 h

About Course

This course introduces fundamental cyber information sharing concepts that can be incorporated into a cybersecurity program for both inside and outside an agency or organization. It introduces the purpose and value of information sharing and how sharing can assist with cyber incident preparedness and response before, during and after a cyber incident occurs.

Course content will assist participants to recognize common types of shared cyber information; understand when to share cyber information with trusted entities and partners; and will explore common methods of securely reporting cyber information. At the end of this course, participants will be able to identify activities needed to establish information sharing policies to be incorporated in a cybersecurity program. 

Cybersecurity is an urgent topic and most organizations recognize they need to do more to better prepare. Organizations may have addressed some information sharing aspects to enhance their cybersecurity posture but may not have assessed how cyber threat information sharing can improve their overall program. 

Objectives

Upon successful completion of this course, participants will be able to:

  • recognize the uses and value of cyber information sharing before, during, and after an incident
  • analyze information that should be shared before, during, and after a cyber incident
  • compare internal and external sharing relationships to develop an effective information sharing program
  • recognize when to share cyber information to internal or external entities
  • perform collection and analysis of a cyber incident, then determine what information will be disseminated through a basic cyber information report
  • develop an action plan to enhance their information sharing capabilities for a cybersecurity program

Target Audience

Decision makers and upper-level management, government administrators, jurisdictional and/or state, policy makers, and technical personnel involved with managing and implementing an information sharing program. These individuals will have budgetary responsibility within the organization and will have influence within the organization to implement an information sharing program.

Prerequisites

Register

Requirements

This is a government-sponsored, live course. Areas shown in blue require government approval to register.

Contact the administrative agency of your state, tribe, or territory before registering.

FEMA Courses require a Student ID for registration. Get your FEMA SID here.

Upcoming

Nothing upcoming.

Online

Register online through our partner.

Contact

CIAS (UTSA)

Email

cias@utsa.edu

Phone

(210) 458-2119

Website

https://cias.utsa.edu/

Future

To sign up for a future delivery for this course, join the waitlist by reaching out via the contact information. Click below to send a prefilled email.

Contact

CIAS (UTSA)

Email

cias@utsa.edu

Phone

(210) 458-2119

Website

https://cias.utsa.edu/

congressionally Funded Training Available

Thousands trained nationwide.

Join the NCPC mailing list