Management of Information Security and Risk

Postgraduate

In Islington

Price on request

Description

  • Type

    Postgraduate

  • Location

    Islington

Overview Concerns about cyber security and information risk have led to a growing market for technical specialists, but there is also a need for more senior professionals with an awareness of both the technical and the business issues who can bridge the gap between IT security and business risk. Such professionals would be responsible for drawing up organisation strategies for managing risk, identifying trade-offs between multiple risks and the cost of protection, and advising higher management on these issues. Typical roles of these professionals might include Security Architect, Chief Information Risk Manager, or Chief Security Officer.This Masters course is aimed at IT professionals with about 5 years experience and is intended to provide them with the skills that they need to progress to a management role in information security and risk. Hence it aims to prepare these professionals for the management roles in Information Security including Security Architect, Chief Information Risk Manager, Chief Security Officer or Chief Information Security Officer. It covers both technical issues such as information security, quantitative risk assessment, and assurance, as well as more business oriented issues such as information leadership and executive development. It will be led from academics by the School of Informatics, with input from Cass Business School and experts from industry.Why you should study for the MSc in Management of Information Security and Risk (MISR) at City University London:Learn about both the technical and the business issues that can bridge the gap between IT security and business risk.Understand how to communicate these risks to both the technical staff and the executive business team (CEO, CIO, CFO and COO) in a language they share.Focus on human-machine interaction and decision making within today's increasingly complex Political-Economical-Socio-Technical (PEST) systems.Find out about latest industry...

Facilities

Location

Start date

Islington (London)
See map
Northampton Square, EC1V 0HB

Start date

On request

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Security Officer
  • Management
  • Risk
  • Business Risk
  • Security
  • Executive
  • Leadership
  • Risk Management
  • Governance
  • IT
  • Performance
  • School
  • Project
  • Systems
  • Industry
  • IT risk
  • Risk manager
  • Team Training
  • Business School
  • Trade
  • Communication Training
  • CFO
  • IT Security
  • IT Development
  • IT Management
  • Architect
  • Skills and Training

Course programme

Course Content

Led by the internationally respected Centre for Software Reliability, the course is delivered with the multidisciplinary Centre for Cyber Security Science and Cass Business School. The course is aimed at IT professionals with around five years' experience. It covers the skills and knowledge necessary to be successful in senior roles in information security and risk.

The course supports the extra breadth of knowledge required by people with professional experience to progress towards target roles in management or consulting on security, assurance and risk. This extra breadth is in the directions of:

  • principles of security and resilience
  • understanding of risk as a socio-technical rather than technical issue
  • a common framework for considering risks with technical and human, accidental and malicious causes
  • analysis of assurance (systems and policies) beyond mere compliance with standards and rules
  • as well as professional development and leadership
Course Structure

Modules providing Professional Skills:

Information Leadership
  • The role of the CIO/information leader past, present and future
  • Relationships with key executive posts such as CEO, COO, CFO
  • Talent management: the information leader's team, key IT functional roles and technology specific issues
  • Financial context: budgeting, corporate/public sector financial reporting, balance sheets, cash flow, income/expenditure, etc. Management accounting issues
  • Purchasing, third-party and customer/supplier management
  • Introduction to IT governance, legal/regulatory issues and the role of policy and standards
  • Information as a source of competitive advantage: when IT does and doesn't matter.
Executive Development
  • Competency frameworks, qualifications and CPD, including; IISP, SFIA, ITIL, BCS and industry certifications
  • Personal SWOT analyses and action planning
  • Developing behavioural competencies in an organisational context; leadership, team working, communication, negotiation, and influencing
  • Reflection, performance appraisal, mentoring and coaching
  • Project, programme and change management in uncertain environments
  • Communities of practice and professional identity.
Socio-technical Systems
  • The concept of socio-technical system; examples of errors caused by technical-only analysis of IT based systems
  • Introduction to Human Factors, cognitive processes, assessment of human performance and human error
  • Unexpected effects of automation on work organisation, behaviour and performance
  • The psychology of risk perception and communication
  • Models and empirical studies of responsibility, trust and trustworthiness
  • Psychology of security and social engineering attacks
  • Organisational factors: roles of culture and incentives
  • Approaches to the study of risk and risk management in socio-technical systems: "Normal accidents", "High reliability organisations", "Resilience engineering".
IT Risk Management for effective performance and the prevention of fraud, error and disaster
  • The assurance gap - how to identify the black hole between the Board's understanding of the governance of the organisation and the operational reality
  • IT Risk Management - how to ensure that IT risks are part of the enterprise risk management process
  • IT Audit - the multi-layered approach to identifying the effectiveness of controls over the systems life cycle, the operational efficacy and the security of the IT resource
  • IT Governance - demonstrating the need for transparency and integration of the IT resource
  • Continuous Monitoring and Continuous Audit - the new dynamic - providing assurance that events - specifically IT related events - are controlled in real time - or close to real time
  • Best Practice IT workshop including case studies showing the causes of major IT failures
  • Prevention of Fraud, denial of service.

Specialized Security and Risk Modules:

Information Security Management
  • Information Security in the 21st century, evolving threats and defences
  • Security policies and governance; Role of standards, guidelines and legislation
  • Communicating security and risk issues to general and executive audiences
  • Selecting and evaluating strategies and technologies for organization wide security.
IT Risk and Resilience
  • Basic concepts, definitions and types of requirements in dependability, security, resilience including reference to the relevant international standards and adopted good practices
  • Systematic methods for identifying vulnerabilities and threats; basic concepts and examples about means for achieving resilience and security: avoidance, prevention, removal, mitigation and recovery at the technical and at the organisational levels
  • Fundamental design trade-offs in formulating information security/resilience strategies; introduction to the means for assessing dependability and resilience and information assurance methodologies
  • Basic concept of the risks due to the interdependencies between critical infrastructures (i.e. power grid reliance on telecommunication and vice versa, etc.) and methods of its quantification and management (interdependency analysis).
Quantitative Risk Analysis
  • Quantifying risk. Probabilistic models. Statistical inference
  • Subjective probabilities and Bayesian inference
  • Dependent events. Dependent random values
  • Worst / best case estimates of probabilities and random values
  • Models of defence / protection
  • Presenting results of risk analysis
Assurance Cases
  • The nature of the assurance and evaluation problem for computer based systems
  • Deriving and structuring of claims in an assurance case; claim expansion from architecture; from dependability attributes.
  • The role of standards, policies and regulations in deriving claims and argument strategies
  • Evidence and arguments for different attributes
  • Reviewing and assessing cases; improving communication. Developing cases for a range of stakeholders - from "boardroom to back office"
  • Cases for specific classes of systems. Issues of scalability
  • The use of tools for assurance cases (e.g. ASCE).

Students also take an independent individual project, which applies the technical contents of the course to a concrete problem. The project may be executed during an internship in an outside organisation, within a successful internship scheme.

Read the full programme specification

Additional information

Teaching and Assessment


The modules will be delivered in block mode, with students taking 2 modules per term. Each module consists of two blocks as follows:

  • Thursday evening: 5pm - 9pm
  • Friday: 9am-5pm
  • Saturday: 9am-5pm

Modules can also be taken individually for Continuing Professional Development (CPD).

In summary, assuming attendance at the Thursday evening sessions can be done without having to take any time off from work, the students are expected to take 8 Fridays off from work in a calendar...

Management of Information Security and Risk

Price on request