Cybersecurity Leadership for Non-Technical Executives


The October 27-28 2020 session will now take place over three days -- September 22-24, 2020 -- in a live online format. September 22,8:30am-3:00pm ET ; Septmeber 23, 9:00am-3:00pm ET; September 24, 9:00am-12:30pm ET. Please view the "Live Online Offering" tab for a sample schedule and additional information on this virtual session.

Cyber risk and cybersecurity are a source of frustration for executives and government officials who spend inordinate time and worry trying to protect their data from sophisticated phishing schemes, ransomware, state-sponsored hacking. However, cybersecurity issues are not purely a technology problem—they are multi-headed hydras that need to be addressed with a multi-disciplinary approach. This timely cybersecurity course provides general managers with a holistic approach to keeping your company secure.

  • Program Details
  • Takeaways
  • Live Online Offering
  • Schedule
  • Participants
  • Faculty
  • The MIT Edge
  • Reviews

Cybersecurity Leadership for Non-Technical Executives
Certificate Track: Management and Leadership
Location: Cambridge, Massachusetts
Tuition: $4,100 (excluding accommodations)
Program Days (for ACE Credit) 2

Download the Cybersecurity Leadership for Non-Technical Executives program brochure

Receive email updates on Cybersecurity Leadership for Non-Technical Executives

Save Program

On the surface, a ransomware attack that effectively locks up your organization’s data is a technical one: Can the data be unlocked, and how fast? But embedded within cyber risk and cybersecurity are a host of management problems as well, including decisions about whether to pay the ransom, how your organization should operate if its data remains locked, and whether new policies are required to respond to similar issues in the future.

In today’s landscape of escalating cybercrime, mitigating cyber risk is not the Chief Information Security Officer’s responsibility alone—it is everyone’s job. Getting ahead of hackers and other security risks requires the active engagement of non-technical management, as well as an overall commitment to building a cybersecurity culture within your enterprise.

Cybersecurity Leadership for Non-Technical Executives is a new program that provides leaders and managers (non-CISOs) with frameworks and best practices for managing cybersecurity-related risk. Program content includes lectures, highly interactive discussions, and case studies related to:

  • Overall cybersecurity awareness
  • The role of non-tech leaders in cybersecurity management
  • Actionable ideas to increase cyber resilience
  • How to measure the organization's cyber-safety level—and how it is changing over time

The course also draws from the U.S. Commerce Department’s National Institute of Standards and Technology (NIST) Framework for policy and management planning—a flexible and cost-effective approach to protecting critical infrastructure.


Fighting cybercrime requires a new kind of leadership

In today’s landscape of escalating cybercrime, resiliency calls for a new kind of leadership and cybersafe culture, requiring the active engagement of both technical and non-technical management.

What Every Manager Should Know About Cybersecurity: Popular Myths and Misunderstandings Exposed

Keeping Our Teams and Our Families Cybersecure

Almost everyone is working from home these days and it's created a strange, chaotic environment for each of us, our organizations and for our families. As we all learn how to communicate, share Wi-Fi, and take meetings remotely, we must also think about keeping ourselves, our teams, and our families cybersecure. In this session, Keri Pearlson discusses some of the current ways malicious actors are trying to get our money, steal company data and infiltrate our systems. We also talk about actions you can take tomorrow to both raise awareness and change behaviors of those around you to keep everyone more secure.

How to survive a hack: Management trumps technology

Companies must build a culture of security, or risk a disastrous attack on data and infrastructure.