Skip to main content

"Feeling like you need infinite budget and headcount in order to tackle your cybersecurity to-do list? This course will help you prioritize and get the most value out of basic defense strategies."

-Jeffrey Groman, CISSP, Cybersecurity Risks and Industry SME

Organizational Cyber Risk

Cybersecurity Risks and Industry

You might know everything you can about the cyber threat landscape, but do you have a plan of action to utilize that knowledge?

Cybersecurity Risks and Industry teaches you to address gaps within your company in terms of the people, processes and technologies responsible for preventing, mitigating and responding to cyberattacks. Through practical learning scenarios that address common cybersecurity incidents and concerns, you will learn to develop an incident response plan for your organization; deputize non-security staff to participate; align processes, policies and tools to upgrade your company's security capabilities, and prioritize strategic education initiatives for your team.

Knowledge Areas

Incident response plan (IRP) • Breach reports • Cybersecurity personnel and responsibilities • Security architecture • Cybersecurity training • Culture of security • Exception handling

The Details

percent icon

100% Online

timer icon

No Mandatory Login Times

calendar icon

8 Modules

pencil and paper icon

4-6 Hours of Work per Module

credit card icon

$2,500

Course Details

This practical cybersecurity course provides guidelines and best practices for implementing effective cybersecurity strategy within your organization. Learn how to assess tools and techniques, distribute responsibilities, educate your team, get the most out of your existing resources, and prepare your organization to face existing cyber threats today and respond with agility to those that may arise in the future.

The Cybersecurity Risks and Industry course covers the following topics over eight instructional modules:

  • Module 1: Assessing the Cyber Risk in Your Organization
  • Module 2: Creating Security Policies and Exception Handling
  • Module 3: Creating a Culture of Security
  • Module 4: Building a Security Architecture Function
  • Module 5: Prioritizing Security Technologies
  • Module 6: Developing an Incident Response Plan (IRP)
  • Module 7: Continuing Education for Security Teams
  • Module 8: Putting It All Together
Jeffrey Groman

Your Subject-Matter Expert:

Jeffrey Groman, CISSP


Jeffrey Groman, founder of Groman Consulting Group, is dedicated to helping organizations identify and resolve their greatest cybersecurity risks. Mr. Groman has worked in the security field for more than 20 years. As a cybersecurity consultant, he has guided major corporations, including banks, insurance companies and software providers through risk prevention and rapid response to incidents and security breaches.

Mr. Groman is certified in forensic analysis and application security, and previously worked with Mandiant Security Consulting Services and FireEye, providing strategic and incident response consulting to security teams and educating executives through delivery of SOC assessments. In these roles, Mr. Groman led a team of consultants and functional experts in working with a wide range of clients across multiple verticals, including NYC Health and Hospitals, Blue Cross Blue Shield Association, Ameriprise Financial, American Express, Ally, Huntington National Bank, Eaton, Caterpillar, DST Systems, Sprint and TransAmerica.

Mr. Groman is passionate about cybersecurity and partnering with clients to find solutions to complex issues. His book "Avoid These 11 Pitfalls and Minimize the Pain of Your Next Data Breach" is designed to help organizations learn from his decades of real-world experience. He has presented at Information Systems Security Association International (ISSA), NetSecure, and Infragard conferences; briefed boards of directors; conducted tabletop exercises and workshops; and helped clients build security processes to be better prepared for the inevitable.

Mr. Groman has a BS in Electrical and Computer Engineering from the University of Colorado, Boulder.