Non-security leaders and technical owners should take it when they must oversee risk, controls, and compliance expectations tied to NIST-aligned requirements.
Cybersecurity programs depend on decisions made by executives, IT leaders, system owners, and technical teams who may not hold a security title but still own risk outcomes. This course is valuable for those roles when they must understand how controls are selected, how risk is evaluated, and how compliance evidence is produced.
It is also relevant for professionals working in program delivery—such as administrators, engineers, and consultants—who need to apply NIST guidance consistently across systems, suppliers, and operational processes.
The highest leverage participants are those who can influence budgets, priorities, and system design decisions; they turn NIST guidance into real implementation.
ISO 31000 supports decision-making by providing a structured way to understand uncertainty, prioritize risks, and select treatment options based on defined criteria.
byGerhard ROTTER
Manage transformation risk by identifying, analyzing, treating, and tracking risks throughout execution while aligning governance, resources, and change management to the strategy.
byGerhard ROTTER
A Lead Cybersecurity Manager designs, governs, and improves a cybersecurity program to manage risks, protect assets, and strengthen organizational resilience.
byChristophe MAZZOLA
Necessary cookies are always active. You can accept, reject non-essential cookies, or customize your preferences.