Introduction
Selling cybersecurity
()
What you should know
()
1. Overview of Systems and Threats
What types of systems are at risk?
()
Resources for educating you
()
Fictional vs. reality
()
Top security threats
()
2. Data Breaches and Losses
Overview of data breaches and losses
()
Why do data breaches matter?
()
Case study: Data breach
()
How to sell data breach and loss risks
()
3. Denial of Service
Overview of denial-of-service risks
()
Why does denial of service matter?
()
Case study: Denial of service
()
How to sell denial-of-service risks
()
4. Internet of Things
Overview of IoT risks
()
Why does it matter?
()
Case study: Internet of Things
()
How to sell IoT risks
()
5. Unsecured Applications
Overview of unsecured application risks
()
Why does it matter?
()
Case study: Unsecured applications
()
How to sell unsecured application risks
()