Defining a Strategic Approach to Cybersecurity (Week 1)-Introduction to the Course (Week 1, Foundations, Overview, and Lecture 1)
Foundations: An Introduction (Please watch if you have not yet taken the first course of this series [optional course, unless you are taking the full specialization]: Cybersecurity for Everyone)
()
Overview: A Strategic Approach to Cybersecurity
()
Introduction to the Course
()
Defining a Strategic Approach to Cybersecurity (Week 1)-What Do We Mean by a Strategic Approach to Cybersecurity? (Week 1, Lecture 2)
What Do We Mean by a Strategic Approach to Cybersecurity?
()
Defining a Strategic Approach to Cybersecurity (Week 1)-Cybersecurity in the Private Sector Context (Week 1, Lecture 3)
Cybersecurity in the Private Sector Context
()
Defining a Strategic Approach to Cybersecurity (Week 1)-Cybersecurity in the Public Sector Context (Week 1, Lecture 4)
Cybersecurity in the Public Sector Context
()
The Challenge of Assessing Strategic Cyber Security Risk in Organizations and Critical Infrastructure
Private Sector Context - Part 1 (Week 2)-Private Organizations: Complexity, Interdependence, and Layered Defense (Week 2, Lecture 1)
Private Organizations: Complexity, Interdependence, and Layered Defense
()
Private Sector Context - Part 1 (Week 2)-Private Organizations: Framework for Practical Action (Week 2, Lecture 2)
Private Organizations: Framework for Practical Action
()
NIST Framework for Improving Critical Infrastructure Cybersecurity v1.1
Private Sector Context - Part 1 (Week 2)-NIST Functions: Identify (Week 2, Lecture 3)
NIST Functions: Identify
()
Private Sector Context - Part 1 (Week 2)-NIST Functions: Protect (Week 2, Lecture 4)
NIST Functions: Protect
()
Private Sector Context - Part 2 (Week 3)-NIST Functions: Detect (Week 3, Lecture 1)
NIST Functions: Detect
()
Private Sector Context - Part 2 (Week 3)-NIST Functions: Respond (Week 3, Lecture 2)
NIST Functions: Respond
()
Private Sector Context - Part 2 (Week 3)-NIST Functions: Recover (Week 3, Lecture 3)
NIST Functions: Recover
()
Private Sector Context - Part 2 (Week 3)-Strategic Context and Developing Cyber Maturity (Week 3, Lecture 4)
Strategic Context and Developing Cyber Maturity
()
NIST Framework for Improving Critical Infrastructure Cybersecurity v1.1
Public Sector Context: Critical Infrastructure and National Response (Week 4)-How Do Governments See the Cybersecurity Problem? (Week 4, Lecture 1)
How Do Governments See the Cybersecurity Problem?
()
Cyberspace Solarium Commission Report - Executive Summary March 2020
Public Sector Context: Critical Infrastructure and National Response (Week 4)-Defining and Categorizing Critical Infrastructure (Week 4, Lecture 2)
Defining and Categorizing Critical Infrastructure
()
Public Sector Context: Critical Infrastructure and National Response (Week 4)-When and How Does a Government Respond? (Week 4, Lecture 3)
When and How Does a Government Respond?
()
Presidential Policy Directive - Critical Infrastructure Security and Resilience
Presidential Policy Directive - United States Cyber Incident Coordination
Protecting National Critical Functions (Week 5)-Beyond Critical Sectors: Defining National Critical Functions (Week 5, Lecture 1)
Beyond Critical Sectors: Defining National Critical Functions
()
Status Update on the National Critical Functions
Protecting National Critical Functions (Week 5)-National Critical Functions: Connections (Week 5, Lecture 2)
National Critical Functions: Connections
()
Protecting National Critical Functions (Week 5)-National Critical Functions: Distribution (Week 5, Lecture 3)
National Critical Functions: Distribution
()
Protecting National Critical Functions (Week 5)-National Critical Functions: Management (Week 5, Lecture 4)
National Critical Functions: Management
()
National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems
Protecting National Critical Functions (Week 5)-National Critical Functions: Supplies (Week 5, Lecture 5)
National Critical Functions: Supplies
()
Strategic Cyber Effects in Complex Systems: Understanding the US Air Transportation Sector
From Device to National Critical Function: Identifying Strategic Consequence (Week 6)-What Do We Mean by Strategic Consequence? (Week 6, Lecture 1)
What Do We Mean by Strategic Consequence?
()
From Device to National Critical Function: Identifying Strategic Consequence (Week 6)-From Device to National Critical Function (Week 6, Lecture 2)
From Device to National Critical Function
()
TSA Rail Cybersecurity Mitigation Actions and Testing
NIST SP800-39, Managing Information Security Risk Organization, Mission, and Information System View
From Device to National Critical Function: Identifying Strategic Consequence (Week 6)-Final Thoughts: Interdependency
Final Thoughts: Interdependency
()