Cybersecurity plays a central role in the online presence of any organization. Cybersecurity is largely a technology-driven process, but its effectiveness depends on its implementation, involving non-technological aspects: people, regulation, budget, business requirements, etc. A reasonable balance of all these aspects is necessary for an effective cybersecurity posture - an art! Learning this art of cybersecurity economics involves strategic decision-making of deploying available resources quickly as a response to evolving threats that can only be presumed. If one over-provisions security to defend against all possible threat scenarios, the cost and complexity of the security measures increase. Unlike in the defense sector, foolproof security is a primary objective and the budget is not a constraint. In contrast, the business sector approaches cybersecurity from a "functional" viewpoint, where the cost-effectiveness & compliance of the deployed security measures is a primary objective. This course will help you learn the art of economics in cybersecurity so that with a judicious mix of budget and resources, you increase the cost of your adversary to launch an attack.
Pedagogy:
The participants will be encouraged to develop several hypothetical use cases of challenging enterprise environments that resemble their past security incident responses. The cohort will learn from each other's best practices while dealing with cybersecurity decision-making.
Cybersecurity has become a complex process. It is a mandatory cost businesses incur. However, an acceptable security posture of an enterprise is dependent on external factors as and when new vulnerabilities come to light and an adversary tries those vulnerabilities against the defense mechanisms of an enterprise. Provisioning for cybersecurity is a never-ending process and it has a cost, which not all enterprises are in a position to bear. This course will help you understand the economics of cybersecurity so that you will be able to provision your resources and budget it effectively to maintain an acceptable security posture of your organization.
On successful completion of this course, you will have a broad understanding of
- Fundamental security principles and their engineering mechanisms
- Modern security operations center (SOC) best practices
Day 1: We will discuss the fundamental principles of cybersecurity and methods to implement these principles. We will collectively undergo use cases to understand the costs of implementing these security principles to defend an online enterprise. In parallel, we will also understand the costs incurred by attackers in launching an attack to understand the asymmetry of the relative costs between an enterprise's defense mechanisms and an attacker's offense mechanisms.
Day 2: We will discuss systematic approaches to define insecurity and mechanisms to mitigate it. We shall assess different security mechanisms for their security guarantees vis a vis its cost. We shall learn how to measure the attack perimeter of an enterprise, devise a threat model for it, sign off risk matrices, and elaborate on generating incident response strategies and compliance reports.
Day 3: We will learn the best practices to implement a modern SOC (Security Operations Center), a single data-driven platform to measure, assess, contain, respond to, and report potential security incidents in an enterprise. We shall also understand the utility of security frameworks like MITRE ATT&CK to model your enterprise's perceived threats against the tactics and techniques used by various threat actors and emerging threats.
Registration Closed
If you/your organisation are interested in this program and would like to learn more, contact us at program@iimmumbai.ac.in
Mode | Offline / IIM Mumbai Campus |
Duration | 3 Contact Days |
Programme Dates | Sep 27, 2024 to Sep 29, 2024 |
Program Chair | Prof Vishwas Patil |
Program Co-Chair | Prof. Ruchita Gupta & Prof. Amit K. Das |