Executive Education: Brown University’s Master In Cybersecurity

IT leaders looking to acquire talented cybersecurity professionals can soon turn their heads in the direction of tiny Rhode Island, as Brown University has announced the launch of its Executive Master in Cybersecurity program.

Enrollment for the advanced IT security degree program is now underway, with the program to kick off with the fall 2016 semester. The 16-month program “builds on the university’s interdisciplinary excellence in cybersecurity, highly accomplished faculty and students, and practical, hands-on experience to produce visionary and confident leaders who understand the technology, human, and policy issues that form a successful cybersecurity strategy,” the university notes.

“Cybersecurity represents one of the greatest threats to industry and governments today, yet the majority of cybersecurity professionals feel they lack the necessary skills and resources to keep up with the ever increasing demands for cybersecurity,” the university explains.

Indeed, concerns over data security and data privacy are a top concern at most organizations today, and several studies have reported on a shortage of qualified cyber security professionals.

Students in the Executive Master in Cybersecurity program will be exposed to the skills and depth-of-knowledge to deploy and manage an effective security strategy that successfully defends against immediate and future cyber threats, and related enterprise challenges, according to the university.

“There’s no such thing as perfect or impenetrable security.  Strategy is the best security,” said Roberto Tamassia, executive director of the Brown Executive Master in Cybersecurity.  “We’ve developed a comprehensive and timely curriculum that teaches cybersecurity leaders how to unite stakeholders in technology, law and policy around an effective strategy.”

The program is not for the IT security newbie. As its name indicates, this is an executive master level program. It is targeted to “highly driven individuals with 5-15 years of professional and managerial experience, and responsibility for security in business, education, financial services, government, healthcare, policy, regulatory, retail, or other sectors,” the university says.

The hope is that students will gain valuable insights and be prepared to:

Address privacy concerns such as cyber intelligence, data privacy, and Internet governance;
 
Understand the security, human and privacy implications of emerging technologies, such as big data, cloud computing, mobile computing, social networks, the Internet of Things, and Web 2.0 applications;

Gain proficiency in identifying vulnerabilities, anticipating attacks, using monitoring tools, and developing defensive strategies;

Build organisational resilience, and crisis management and response capabilities.

Information-Management: http://bit.ly/1WD09F8

« Cyber Risk Insurance Is A Patchwork
Forget Trident & Welcome To Cyber Warfare »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Cloud Credential Council (CCC)

Cloud Credential Council (CCC)

The CCC is a leading provider of vendor-neutral certification programs that empower IT and business professionals in their digital transformation journey.

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

Cyber Execs

Cyber Execs

Cyber Execs is a Cyber Security Consultancy & Executive Recruitment firm.

MAD Security

MAD Security

MAD Security is a premier provider of information and cybersecurity solutions that combine technology, managed security services, support and training.

Global Lifecycle Solutions EMEA (Global EMEA)

Global Lifecycle Solutions EMEA (Global EMEA)

Global EMEA provides full lifecycle services to corporate Clients covering procurement, configuration, support, maintenance and end-of-life asset management.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

Infostream

Infostream

Infostream is a leading integrator of Digital Transformations Solutions (DTS); Public, Private, and Hybrid Cloud; Cybersecurity; Data Integrity; DevOps, DevSecOps, and Infrastructures.

Persona

Persona

At Persona, we’re humanizing online identity by helping companies verify that their users are who they say they are.

QA Consultants

QA Consultants

QA Consultants is North America’s largest software quality engineering services firm, an award-winning onshore provider of software testing and quality assurance solutions.

SilverEdge Government Solutions

SilverEdge Government Solutions

SilverEdge is a next generation provider of innovative and proprietary cybersecurity, software, and intelligence solutions for the Defense and Intelligence Communities.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.

Domotz

Domotz

Domotz enables IT teams to monitor and manage their networks remotely, while ensuring that the security and the operational efficiency of their organizations are properly maintained.

FastPassCorp

FastPassCorp

In the world of IT, identity theft is a growing concern. FastPass offers an innovative solution as a cloud or on-premises offering.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.

IT.ie

IT.ie

IT.ie are a comprehensive provider of Managed IT Services, Cloud Solutions, Cyber Security, and proactive IT support services.