Executive Education: Brown University’s Master In Cybersecurity

IT leaders looking to acquire talented cybersecurity professionals can soon turn their heads in the direction of tiny Rhode Island, as Brown University has announced the launch of its Executive Master in Cybersecurity program.

Enrollment for the advanced IT security degree program is now underway, with the program to kick off with the fall 2016 semester. The 16-month program “builds on the university’s interdisciplinary excellence in cybersecurity, highly accomplished faculty and students, and practical, hands-on experience to produce visionary and confident leaders who understand the technology, human, and policy issues that form a successful cybersecurity strategy,” the university notes.

“Cybersecurity represents one of the greatest threats to industry and governments today, yet the majority of cybersecurity professionals feel they lack the necessary skills and resources to keep up with the ever increasing demands for cybersecurity,” the university explains.

Indeed, concerns over data security and data privacy are a top concern at most organizations today, and several studies have reported on a shortage of qualified cyber security professionals.

Students in the Executive Master in Cybersecurity program will be exposed to the skills and depth-of-knowledge to deploy and manage an effective security strategy that successfully defends against immediate and future cyber threats, and related enterprise challenges, according to the university.

“There’s no such thing as perfect or impenetrable security.  Strategy is the best security,” said Roberto Tamassia, executive director of the Brown Executive Master in Cybersecurity.  “We’ve developed a comprehensive and timely curriculum that teaches cybersecurity leaders how to unite stakeholders in technology, law and policy around an effective strategy.”

The program is not for the IT security newbie. As its name indicates, this is an executive master level program. It is targeted to “highly driven individuals with 5-15 years of professional and managerial experience, and responsibility for security in business, education, financial services, government, healthcare, policy, regulatory, retail, or other sectors,” the university says.

The hope is that students will gain valuable insights and be prepared to:

Address privacy concerns such as cyber intelligence, data privacy, and Internet governance;
 
Understand the security, human and privacy implications of emerging technologies, such as big data, cloud computing, mobile computing, social networks, the Internet of Things, and Web 2.0 applications;

Gain proficiency in identifying vulnerabilities, anticipating attacks, using monitoring tools, and developing defensive strategies;

Build organisational resilience, and crisis management and response capabilities.

Information-Management: http://bit.ly/1WD09F8

« Cyber Risk Insurance Is A Patchwork
Forget Trident & Welcome To Cyber Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Vaddy

Vaddy

Vaddy provide an automatic web vulnerability scanner for DevOps that performs robust security checks to ensure that web app code is secure.

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence Service (CSIS)

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection.

Israel Aerospace Industries (IAI)

Israel Aerospace Industries (IAI)

IAI offers a holistic approach that provides defense forces, governments, critical infrastructures and large enterprises with end-to-end cyber security & monitoring tools.

Ethoca

Ethoca

Ethoca is a secure network for card issuers and merchants to connect and work cooperatively outside the payment network in a unique and powerful way.

IPN (ICT Research Platform Nederlands)

IPN (ICT Research Platform Nederlands)

IPN promotes academic research and education in the ICT field by building and maintaining a national community, and by developing policy to advance the field. Areas of focus include Cyber Security.

InnoValor

InnoValor

InnoValor realises value from digital innovation for organisations and government. We provide advisory services and develop innovative software solutions, based on our background in research.

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

Ronet Cyber Security

Ronet Cyber Security

Ronet Cyber Security offers crypto forensics services for regulators, law enforcement, companies and individuals to ensure that your transactions are safe and secure.

RAD Security

RAD Security

RAD Security (formerly KSOC) is a cloud native security company that empowers engineering and security teams to drive innovation so they can focus on growth versus security problems.

NOYB

NOYB

NOYB is a non-profit organization aiming to close the gap between privacy laws and the reality of corporate practice.

AmiViz

AmiViz

AmiViz is the first B2B enterprise marketplace focussed on Cybersecurity business in the Middle East and Africa, designed specially to serve the interests of enterprise resellers and vendors.