Check out our 2025 Summer Research Symposium
Signed in as:
filler@godaddy.com
Check out our 2025 Summer Research Symposium
Signed in as:
filler@godaddy.com
The Critical Infrastructure Protection for Executive Leaders Course series equips professionals with the knowledge and tools to safeguard vital operations from emerging threats. Covering the intersection of cyber and physical security, these courses explore strategies for organizational integration, the role of cybersecurity in traditional security management, and the use of crisis management frameworks for resilience. Participants will also dive into cutting-edge security technologies, including drones and robots, learning about their operational benefits and regulatory considerations. Additionally, the series addresses pressing threats such as economic espionage, intellectual property theft, and insider risks, providing actionable strategies to identify vulnerabilities and enhance organizational security. Whether you're looking to strengthen existing protocols or implement new solutions, this series offers a comprehensive approach to protecting critical infrastructure.
This course introduces the role of intelligence in protecting critical infrastructure, emphasizing the intelligence cycle, situational awareness, and cognitive biases in analysis. Students will learn to develop actionable intelligence for risk-based decision-making in both public and private sector settings.
This course introduces the principles and practical applications of the Defense-in-Depth strategy for cybersecurity, with a focus on protecting critical infrastructure (CI). As cyber threats become more sophisticated, the need for layered security has never been more urgent. Students will learn how to implement and manage comprehensive cybersecurity defenses that safeguard vital systems and data against evolving risks.
Learners will gain an understanding of the overlap and redundancy between cyber and physical security at critical infrastructure sites, and explore available options for organizational integration.
Learners will be familiarized with how cybersecurity tools, systems, and processes can be leveraged to achieve security management objectives similar to those used in physical security.
Learners will understand how to use the Crisis Management and Resilience Process as a strategic tool for protecting critical infrastructure operations.
Learners will explore the operational advantages of using security drones and robots for tasks such as patrols, access control, vehicle inspections, and incident response. The course will cover the regulatory requirements associated with security drones and robots. Participants will also learn how to build a business case for integrating security drones and/or robots, highlighting their multi-functional value in emergency management, maintenance, and security operations.
Learners will gain an understanding of economic espionage and intellectual property theft, including the methods employed by malicious actors. The course will cover strategies for identifying vulnerabilities and provide practical steps to safeguard organizations from these threats.
Learners will gain a solid understanding of the insider threat and how to manage it effectively. The course will explore the factors that can foster insider threats, along with early warning signs and indicators. By the end, learners will be equipped to implement strategic insider threat management to safeguard and support business operations.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.