Autoplay
Autocomplete
Previous Lesson
Complete and Continue
From Zero to Cybersecurity Certification
Before you start:
Why Cybersecurity - and why Mindset is important. (1:58)
My holistic Cybersecurity Approach (1:21)
Project Lead Duties (3:25)
Important:
Project Management, NO Micro Management! (1:55)
Note: My Budget Recommendations
Don't make these Cybersecurity Budget Mistakes! (2:38)
Why Cybersecurity Certification? (3:05)
Save Money first! (0:08)
Build and buy along your Business Strategy (1:23)
Find Partners for your Budget. (0:47)
Selling Cybersecurity! [+ Upsell Ideas] (1:35)
Course & Project Structure:
Course Overview (2:41)
Service Form
Data Minimisation 1st!
Always latest Information.
20 Weeks of Learning
Days 1-34/ Week 1-5: Take your Time, grow into your Role!
From Day 35/ Week 6: Project Templates
Key Moment: Choose the right Framework!
Reaching Certification Level
Deepen Strategy in Year 2
1. Shifting Attack Scenarios
How do Hackers look like? (2:55)
Assets at Risk (1:16)
From Computer Virus to AI Fraud (2:13)
Work Process Attacks (1:55)
Attacks against Key Player (3:15)
Identity Theft (2:06)
AI Deepfakes (1:44)
Reputation Damages (1:23)
[More Cybersecurity + Business Insights on YouTube!]
@carolindesireetoepfer: Managing Uncertainty.
Note: AI in Cybersecurity and Risk Management
Fraud Alarm! AI used the wrong way. (1:35)
Where AI helps in Cybersecurity (2:39)
How to ask AI for IT Support (0:57)
2. Quick Fixes
Updates (0:54)
Cancellations (2:05)
Backup Strategy (1:08)
Feedback (1:08)
3 Work Process Changes [incl. 2FA] (2:26)
Employee Lifecycle (1:22)
Penalties (1:52)
3. Legal Requirements
No Legal Advice! But Guidance. (1:40)
Regulatory Patterns (2:44)
Data Protection (2:30)
Cybersecurity (2:18)
Business Continuity (1:20)
Artificial Intelligence (0:50)
Industry Requirements (0:40)
Controlling Supply Chains (1:22)
Reporting Timelines (3:08)
Checklist: Legal Meeting Prep
Insights: Cyber Insurance
Limiting Costs, not limiting Liability! (3:51)
Company-Insurance-Fit (0:58)
1st Double Check
Evaluate your Project Status!
Cybersecurity Status Checks
Be precise! (2:09)
Avoid Misunderstandings: (1:39)
You better know nothing. (1:19)
Asking "stupid" questions the right way... (3:05)
[Weekly Office Hours!]
Prepare your first office hours for the best experience:
Friday - 10.00AM Berlin/ 11.00AM Johannesburg/ 13.00AM Dubai/ 14.30AM Delhi/ 17.00 Singapore/ 18.00 Tokyo
Friday - 17.00AM Berlin/ 8.00AM LA/ 10.00AM Dallas/ 11.00AM NYC/ 13.00 Rio de Janeiro
4. Risk Matrix Development
Holistic View on a Company's Risks
Dynamic Changes
Research Approach
Rumors and Updates
Who can help?
Note: My CISO Project Insights
Lobbying
People Skills
Brutal Honesty
Structure & self-organisation
Time Management & parallel Tasks
Boundaries
Conflicts
Be pro-active!
5. PROJECT TEMPLATES
How to set up your work environment for success:
Risk Matrix Template
Budget Template
Identify Clients for Upsells
Cybersecurity Project Timeline Template
Roles and Responsibility Overview
Framework Questions/ Requirements
Project Tasks + Traffic Light System
Work Diary
Document Folder
Inbox and/ or ITIL Area
Training Landingpage
Worst Case Plan
6. Training leads to Participation!
Start now!
Early Alarm System
Mandatory Training
Cyber Games
Up to Date Information
Human Barrier Campaigns
What works, what doesn't:
Anti-Fraud Campaigns
Technical Measures
Org Measures
People Measures
Secure AI
Avoid Shadow AI!
AI Business Tools
AI Automation and Agents
AI Tool Implementation Roadmap
Software Development with AI
Reputation Management
Standards
Brand Safety
Digital Intelligence
7. Choose the right Framework
Important Metrics
Possible Frameworks
Focus: CyberTrust
Focus: ISO27001
Focus: ISO42001
Focus: ISO22301
Focus: SOC2
Specific Industry Certifications
Management Decision needed!
Find the right Partners
IT Support
Cybersecurity Solution Partners
Security Operations Center
Legal Support
Regular Training
Cyber Insurance
Crisis Communication
8. Cybersecurity Project Planning
Keeping an Overview
Double Check with the Framework (again, and again, and again)
Meetings & Mails
Org Performance
Motivation for repeating Tasks
Project Partners
Timeline and Milestones
Change Management
Communication and Documentation
Setting up your ISMS
My Take on ISMS/ Compliance Tools
Better done than perfect!
Basic Tools
Special Tools
Data Exchange
2nd Double Check
Evaluate your Project Status!
9. IT Infrastructure Overview
Framework
Workplace
Infrastructure
Development
Product
Client Solutions
Catching Fraud
How Fraud and Phishing looks like in Daily Business
Individual Strategies in Business Communication
Double Check "Clients"
10. Worst Case Plan
Key People
Phone Numbers
Service Level Agreements
Quality of Process Descriptions
Question - Answer - Evidence
Sensitive Information vs. makes sense Information
Easy to understand, please!
Reading a Cybersecurity Certificate
11. Policies
Templates
Industry Add-ons
Customization
3rd Double Check
Evaluate your Project Status!
1st Assessment for Certification Preparation
Preparing the Framework
Asking "stupid" Questions
Taking Notes: Facts, not Feelings!
12. Vendor Management
As Client
As Data Processor
As IT Vendor
Ask the critical Questions!
Onboarding/ Change of IT Vendors
Tender Process (?)
Cybersecurity Assessment
Contract Negotiations
Onboarding Project
Data Migration
Cooperation with Core IT Infrastructure Providers
2nd Assessment
Double checking your Project Documentation
Status Updates
Filling Last Gaps
Internal Audit
Internal or external Auditor?
Blocking Time
Inviting Key People
Taking Notes
Management Review
Translating Cybersecurity Measures into Management Expectations
Clear words, yet prepared.
Return on Invest
External/ Certification Audit
Finding the right Auditor
Organisation of Audit Days
Moderation of Audit Days
Linkedin Challenge:
Photo Post
De-briefing and preparing Year 2
Learning from you Project Documentation
Executive Summary and Recommendations
Update Meetings
13. Contact to Stakeholders and Regulators
Institutions
Networks
Working Groups
Your way in...
14. Cybersecurity for Business Development
Upsell: needs of remaining clients
Brand Trust: reach a new audience - and clients
New business: security instead of industry focus
15. Future of Cybersecurity
AI
Agents
Quantum
Fraud
Dependencies
AI Automation and Agents
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock