The IWP Cyber Intelligence Initiative (Ci2) offers courses on the intelligence and counterintelligence aspects of cyber security that benefit a wide array of professionals.
See how Ci2 is right for you.
Chief Executive Officer
It is an imperative that a CEO establish the appropriate cyber intelligence/cyber security “tone at the top” of his or her organization. CEOs will be presented information regarding the importance of information security and how cybersecurity is everyone’s shared responsibility in a truly digital world. CEOs will learn how to establish an organizational “culture of cybersecurity” which has proven to be one of the best defenses against cyber adversaries. Cyber Intelligence is about the people, not the technology. And technology can either be an organization’s greatest defense or its weakest link against an adversarial cyber-attack.
Chief Financial Officer
CFOs will increase their knowledge of core cybersecurity concepts. This knowledge will help them leverage their own leadership skills to conceptualize and manage risk in strategic terms and understand the business impact of Cyber risk. It is incumbent upon CFOs to learn more about cybersecurity to ensure their company is taking appropriate actions to secure their most valuable information assets.
Chief Information Officer
The CIO will be exposed to their very important role in security and cyber intelligence. CIOs will learn of their importance and how well suited they are to plan a company’s Cyber Strategy and protect their companies’ data. Their understanding of the technology makes them well suited for this activity. As businesses undergo digital transformation, much of their value comes from the information they have and in the delivery of those digital assets. The CIO has really the best skillset within the organization to understand this technology and will learn about protecting information across multiple cross-functional areas.
Chief Information Security Officer
(CISO) will have their role affirmed as the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO will come away with a better understanding of identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and information technology (IT) risks, with a focus on risks stemming from human factors as opposed to technological factors. Topics may include incident response, establishing appropriate standards and controls, managing security technologies, and directing the establishment and implementation of policies and procedures.
The cyber security professional will gain knowledge of threats – especially threats stemming from human vulnerabilities — and how they relate to system architectures, system administration, operating systems, networking, virtualization software, and other major components of IT systems. Obtaining a big picture view will allow the Cyber Professional to see where possible vulnerabilities lie and how to protect all access points from attacks. Those with a CompTIA Security+ certification have a broad range of knowledge, and the Cyber program will enhance your ability to apply the knowledge. You will learn about Intelligence skills, statecraft, and combine this learning with the capabilities you already have.
Government Contractors will become familiarized with the threats facing DoD’s unclassified information and the dramatic increase as more services are provided online. They will learn about a variety of information technology services for which the government relies on Contractors. Recent high-profile incidents involving government information demand that information system security requirements are clearly, effectively, and consistently communicated to both government and industry. Contractors will learn and practice the BLUF method required when presenting the results of an analysis to the government.
Government workers will be exposed to, and learn, enough to reskill themselves. For those who already have some cyber skills, we help them maintain pace with new developments and avoid becoming less relevant due to advances in the technology. Students may gain an aptitude and skills needed to identify and select Cyber Team Members.
Information Security Professionals
Good cybersecurity pros know how to examine a company’s security setup from a view which includes threat modeling, specifications, implementation, testing, and vulnerability. Cybersecurity professionals will gain the necessary technical “soft skills” (such as clear communication, diplomacy, and other facets of statecraft). These skill will assist them to advance in their career and both in terms of promotions and salaries.
Information Technology Professionals
The urgent need for cybersecurity has created a high-level tech field wide open to seasoned IT pros if they gain the right knowledge and experience. IT pros will gain what is necessary to heighten the odds against getting hacked and security breaches by gaining an understanding of the role of intelligence and counterintelligence to mitigate these vulnerabilities. This course of study is designed to help prevent your organization’s credit card information from sitting in the hands of an anonymous hacker.
Members of the Intelligence Community
Joshua Skule, the executive assistant director for intelligence at the FBI, said “Due to technology and a lot of other innovation, we cannot think of the intelligence community as overseas and domestic any longer.” Members of the Intelligence Community will gain knowledge of cyber threats, cyber warfare, and what the cyber realm can provide to the Intelligence Professionals within the Intelligence Community.
Military and Veterans
Whether currently transitioning from active duty or seeking a career change, service members will learn and further their cyber expertise. There is a growing digital battlefield which the DoD is facing. Our courses will help prepare service members, both past and present, for positions from analyst and incident responder to information assurance technician by teaching about the role of intelligence and counterintelligence in the cyber realm.
Those looking to transition from the public sector or those already in the private sector will learn how to create cyber intelligence plans to help their organizational culture and executive leadership understand, maintain, listen to, and follow through on needed cybersecurity actions to protect the enterprise effectively. Learn how to convince executives that cybersecurity is not a finite problem that can be solved, rather an ongoing process. That’s why cybersecurity efforts must also focus on risk management, as opposed to just risk mitigation.