Autoplay
Autocomplete
Previous Lesson
Complete and Continue
From Zero to Cybersecurity Certification [January - May 2026]
Before you start:
This is going to be huge! ;-) (1:24)
Why Cybersecurity - and why Mindset is important. (1:58)
Project Lead Duties (3:25)
My holistic Cybersecurity Approach (1:21)
Note: My Budget Recommendations
Don't make this Cybersecurity Budget Mistakes! (2:38)
Save Money first! (0:08)
Build and buy along your Business Strategy (1:23)
Find Partners for your Budget. (0:47)
Selling Cybersecurity! [+ Upsell Ideas] (1:35)
Course & Project Structure:
Course Overview (2:41)
Data Minimisation 1st!
20 Weeks of Learning
Week 1-5: Take your Time, grow into your Role!
Week 7: Project Templates
Week 9: Choose your Framework (Key Moment!)
Reaching Certification Level
Deepen Strategy in Year 2
[More Cybersecurity + Business Insights on YouTube!]
@carolindesireetoepfer: Managing Uncertainty.
1. Shifting Attack Scenarios
How do Hackers look like? (2:55)
Assets at Risk (1:16)
From Computer Virus to AI Fraud (2:13)
Work Process Attacks (1:55)
Attacks against Key Player (3:15)
Identity Theft (2:06)
AI Deepfakes (1:44)
Reputation Damages (1:23)
Note: AI in Cybersecurity and Risk Management
Fraud Alarm! AI used the wrong way. (1:35)
Where AI helps in Cybersecurity (2:39)
2. Quick Fixes
Updates (0:54)
Cancellations (2:05)
Feedback (1:08)
3 Work Process Changes [incl. 2FA] (2:26)
Employee Lifecycle (1:22)
Penalties (1:52)
[Weekly Office Hours!]
Friday - 10.00AM Berlin/ 11.00AM Johannesburg/ 13.00AM Dubai/ 14.30AM Delhi/ 17.00 Singapore
Friday - 17.00AM Berlin/ 8.00AM LA/ 10.00AM Dallas/ 11.00AM NYC/ 13.00 Rio de Janeiro
3. Legal Requirements
No Legal Advice!
Where Small Business Owners find Legal Support
General Logic
Data Protection
Cybersecurity
Business Continuity
Artificial Intelligence
Software + IT Provider
Individual Industry Requirements
Controlling Supply Chains
Reports and Timelines
1st Double Check
Evaluate your Project Status!
4. Risk Matrix Development
Holistic View on a Company's Risks
Dynamic Changes
Research Approach
Rumors and Updates
Who can help?
Note: My CISO Project Insights
Lobbying
People Skills
Conflicts
Structure & self-organisation
Time Management & parallel Tasks
Boundaries
5. PROJECT TEMPLATES
How to set up your work environment for success:
Risk Matrix Template
Budget Template
Identify Clients for Upsells
Cybersecurity Project Timeline Template
Roles and Responsibility Overview
Framework Questions/ Requirements
Project Tasks + Traffic Light System
Work Diary
Document Folder
Inbox and/ or ITIL Area
Training Landingpage
Worst Case Plan
6. Training leads to Participation!
Early Alarm System
Mandatory Training
Up to Date Information
Human Barrier Campaigns
What works, what doesn't:
Anti-Fraud Campaigns
Technical Measures
Org Measures
People Measures
Reputation Management
Standards
Brand Safety
Digital Intelligence
7. Choose the right Framework
Important Metrics
Possible Frameworks
Focus: CyberTrust
Focus: ISO27001
Focus: ISO42001
Focus: ISO22301
Focus: SOC2
Specific Industry Certifications
Management Decision needed!
Find the right Partners
IT Support
Cybersecurity Solution Partners
Security Operations Center
Legal Support
Regular Training
Cyber Insurance
Crisis Communication
8. Cybersecurity Project Planning
Keeping an Overview
Double Check with the Framework (again, and again, and again)
Meetings & Mails
Org Performance
Motivation for repeating Tasks
Project Partners
Timeline and Milestones
Change Management
Communication and Documentation
Setting up your ISMS
Better done than perfect!
Basic Tools
Special Tools
2nd Double Check
Evaluate your Project Status!
9. IT Infrastructure Overview
Workplace
Infrastructure
Development
Product
Catching Fraud
How Fraud and Phishing looks like in Daily Business
Individual Strategies in Business Communication
Double Check "Clients"
10. Worst Case Plan
Key People
Phone Numbers
Service Level Agreements
Quality of Process Descriptions
Question - Answer - Evidence
Sensitive Information vs. makes sense Information
Easy to understand, please!
Reading a Cybersecurity Certificate
11. Policies
Templates
Industry Add-ons
Customization
3rd Double Check
Evaluate your Project Status!
1st Assessment
Preparing the Framework
Asking "stupid" Questions
Taking Notes: Facts, not Feelings!
12. Vendor Management
As Client
As Data Processor
As IT Vendor
Ask the critical Questions!
Onboarding/ Change of IT Vendors
Tender Process (?)
Cybersecurity Assessment
Contract Negotiations
Onboarding Project
Data Migration
Cooperation with Core IT Infrastructure Providers
2nd Assessment
Double checking your Project Documentation
Status Updates
Filling Gaps
Internal Audit
Internal or external Auditor?
Blocking Time
Inviting Key People
Taking Notes
Management Review
Translating Cybersecurity Measures into Management Expectations
Clear words, yet prepared.
Return on Invest
External/ Certification Audit
Finding the right Auditor
Organisation of Audit Days
Moderation of Audit Days
Linkedin Challenge:
Photo Post
De-briefing and preparing Year 2
Learning from you Project Documentation
Executive Summary and Recommendations
Update Meetings
13. Contact to Stakeholders and Regulators
Institutions
Networks
Working Groups
Your way in...
14. Cybersecurity for Business Development
Upsell: needs of remaining clients
Brand Trust: reach a new audience - and clients
New business: security instead of industry focus
15. Future of Cybersecurity
AI
Agents
Quantum
Fraud
Dependencies
Boundaries
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock