Jones International University

MBA in Information Security Management - Cyber Security

Secure a better future. The four ISM courses in our MBA specialization are designed to provide realistic recommendations for improving the information security of an organization.  In addition to providing background on the growing need for and issues associated with information security, these courses will help students develop practical information security programs that include the people, process and technology components essential to any effective management program. The courses also provide students with practical experience in risk assessment and management, business continuity planning, and incident response from an information security management perspective.  If you have a keen interest in information security yet need a comprehensive MBA program to hone your leadership and business management skills, this degree program is for you.

Integral to our ISM program is OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) an industry-accepted approach to risk assessment that focuses on helping companies improve their overall information security posture. OCTAVE was developed at the CERT Coordination Center. In addition to providing a systematic, flexible methodology that enables organizations of all sizes to develop security priorities based on their business needs and concerns, OCTAVE is also the preferred risk assessment approach for preparing organizations for compliance with HIPPA (Health Insurance Portability and Accountability Act) and complements audit control frameworks like COSO and COBIT for assuring compliance with SOX (Sarbanes-Oxley). For information on the OCTAVE methodology go to: http://www.cert.org/octave/.

Degree Learning Objectives:

  • Demonstrate how to create a security policy in an organization and explain how to enforce compliance
  • Apply basic technical security concepts to a current state of security within an organization using a layered security model
  • Conduct an extensive gap analysis of various systems, and develop a risk management plan for an organization
  • Develop a disaster recovery plan and implement lessons learned from previous disasters to improve the plan
  • Develop foundational business knowledge and skills through the core courses

Who should enroll:

The central focus of this program is for general managers whose responsibilities encompass corporate security and information risk management as well as those working as (or who aspire to be) chief security officers. This degree specialization also will appeal to compliance specialists, enterprise security managers and administrators, data security analysts and IS professionals who seek career advancement in upper management.

Other Programs

    • No Matching Schools
  • Related Careers

    • No Entries Found
    Ask An Expert: Real Questions, Expert Answers

    Ask your Question