This course explores the world of technology and information security from a risk management perspective. Through an understanding of history and the examination of trends in today’s technology landscape, the course investigates the sources of risk and its business implications. Practical hands-on methodologies on the handling of risks are covered, as well as the process of reviewing and developing security management plans and governance frameworks.
|
Download the PDF to complete the readings as assigned in the Workplan. |
|
Read this case in order to participate in this week's Think Tank. |
|
Read this case in order to participate in this week’s Think Tank. |
|
Read this case in order to participate in this week’s Think Tank. |
|
Read this case in order to participate in this week’s Think Tank. NOTE: This case is also used in Assignment 1. |
|
NOTE: This is the same case that was studied in Week 4. Please re-read it in order to participate in this week’s Think Tank. |