{"id":231,"date":"2021-09-15T21:17:59","date_gmt":"2021-09-15T21:17:59","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=231"},"modified":"2025-05-02T15:40:06","modified_gmt":"2025-05-02T15:40:06","slug":"ece-416","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/brendopierce\/ece-416\/","title":{"rendered":"CYSE 525"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Strategy and Policy<\/h1>\n<p><strong>Course Description:<\/strong><\/p>\n<p>This course explores cybersecurity policy and strategy and introduces students to the essentials of strategy development and policy making in cybersecurity. Topics considered include planning principles in cyber strategy; risk management and cybersecurity policy; the connections between cybersecurity policies, businesses, and governmental institutions; the knowledge, skills, and abilities needed to develop and implement cybersecurity policy; the social, political and ethical implications that arise in cybersecurity policies and strategies; strategies to assess cybersecurity policy; and the ties between national security and cybersecurity policy.<\/p>\n<ul>\n<li>\n<p><strong>Course Objectives:<\/strong><\/p>\n<p>By the end of the course, the students will be able to:\u00a0<\/p>\n<ol>\n<li>Describe the goal and structure of a national security strategy and compare it to cybersecurity strategy.<\/li>\n<li>Critically communicate the political and social implications that arise with cybersecurity policies and strategies.<\/li>\n<li>Compare and interpret cybersecurity policy issues and make recommendations on policy choices.<\/li>\n<li>Identify international cyber crisis management and conflict resolution mechanisms.<\/li>\n<li>Debate ethical issues that arise with cybersecurity policies<\/li>\n<li>Identify possible developments in cybersecurity strategy and policy.<\/li>\n<li>Assess cybersecurity strategy and policy<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<p style=\"text-align: left\"><strong>Course Outcome<\/strong><\/p>\n<p class=\"my-0\">This course broadened my understanding of cybersecurity, focusing on strategy, policy development, and the ethical and societal impacts beyond just technical solutions. It gave me valuable skills that I applied during my internship and that strengthen my resume for GRC (Governance, Risk, and Compliance) roles.<\/p>\n<p class=\"my-0\"><strong>Key Engagements:<\/strong><\/p>\n<ol class=\"marker:text-textOff list-disc\">\n<li>\n<p class=\"my-0\"><strong>Strategy &amp; Policy Analysis:<\/strong>\u00a0Compared national and organizational cybersecurity strategies, and assessed how frameworks like NIST CSF and CMMC guide risk management.<\/p>\n<\/li>\n<li>\n<p class=\"my-0\"><strong>Policy Recommendations:<\/strong>\u00a0Wrote policy briefs and case studies, including proposals to improve critical infrastructure protection and debates on ethical issues like AI surveillance.<\/p>\n<\/li>\n<li>\n<p class=\"my-0\"><strong>International &amp; Crisis Management:<\/strong>\u00a0Explored global cyber norms and participated in simulations managing international cyber incidents.<\/p>\n<\/li>\n<li>\n<p class=\"my-0\"><strong>Real-World Application:<\/strong>\u00a0Used these skills at my internship to review policies for compliance, help draft incident response plans, and present on global regulations.<\/p>\n<\/li>\n<\/ol>\n<p class=\"my-0\">This course helped me see cybersecurity from a broader perspective, preparing me to align technical solutions with strategic, legal, and ethical considerations.<\/p>\n<p><em>Sample artifacts from this course, including my policy brief and compliance roadmap, are available in my e-portfolio.<\/em><\/p>\n<div class=\"border-borderMain\/50 ring-borderMain\/50 divide-borderMain\/50 dark:divide-borderMainDark\/50  dark:ring-borderMainDark\/50 dark:border-borderMainDark\/50 bg-transparent\">\n<div class=\"gap-y-md flex flex-col\">\n<div class=\"flex items-center justify-between\">\n<div class=\"-ml-sm gap-xs flex items-center\">\n<div class=\"flex items-center min-w-0 font-medium gap-1.5 justify-center\">\n<div class=\"flex shrink-0 items-center justify-center size-4\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div class=\"gap-x-xs flex items-center\">\n<div class=\"gap-xs flex items-center border-borderMain\/50 ring-borderMain\/50 divide-borderMain\/50 dark:divide-borderMainDark\/50  dark:ring-borderMainDark\/50 dark:border-borderMainDark\/50 bg-transparent\">\n<div class=\"flex items-center min-w-0 font-medium gap-1.5 justify-center\">\n<div class=\"flex shrink-0 items-center justify-center size-4\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div class=\"gap-xs flex items-center border-borderMain\/50 ring-borderMain\/50 divide-borderMain\/50 dark:divide-borderMainDark\/50  dark:ring-borderMainDark\/50 dark:border-borderMainDark\/50 bg-transparent\">\n<div class=\"flex items-center min-w-0 font-medium gap-1.5 justify-center\">\n<div class=\"flex shrink-0 items-center justify-center size-4\">\u00a0<\/div>\n<\/div>\n<div class=\"flex items-center min-w-0 font-medium gap-1.5 justify-center\">\n<div class=\"flex shrink-0 items-center justify-center size-4\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div class=\"flex items-center min-w-0 font-medium gap-1.5 justify-center\">\n<div class=\"flex shrink-0 items-center justify-center size-4\">\u00a0<\/div>\n<\/div>\n<div class=\"\">\n<div class=\"flex items-center min-w-0 font-medium gap-1.5 justify-center\">\n<div class=\"flex shrink-0 items-center justify-center size-4\">\u00a0<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"\">\n<div class=\"animate-in fade-in duration-100 ease-out border-borderMain\/50 ring-borderMain\/50 divide-borderMain\/50 dark:divide-borderMainDark\/50  dark:ring-borderMainDark\/50 dark:border-borderMainDark\/50 bg-transparent\">\n<div class=\"border-borderMain\/50 ring-borderMain\/50 divide-borderMain\/50 dark:divide-borderMainDark\/50  dark:ring-borderMainDark\/50 dark:border-borderMainDark\/50 bg-transparent\">\n<div class=\"flex items-center justify-between border-borderMain\/50 ring-borderMain\/50 divide-borderMain\/50 dark:divide-borderMainDark\/50  dark:ring-borderMainDark\/50 dark:border-borderMainDark\/50 bg-background dark:bg-backgroundDark\">\n<div class=\"flex w-full items-center justify-between mb-sm\">\n<div class=\"\">\n<div class=\"space-x-sm flex items-center\">\n<div class=\"default font-display text-lg font-medium text-textMain dark:text-textMainDark selection:bg-super\/50 selection:text-textMain dark:selection:bg-superDuper\/10 dark:selection:text-superDark\">\n<div class=\"w-[24px]\">\u00a0<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-content\/uploads\/sites\/26054\/2025\/05\/CYSE525-Policy-Analysis-1-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE525-Policy-Analysis-1-2.\"><\/object><a id=\"wp-block-file--media-fb0c6198-c29b-4905-b85a-ab3eaf48a9a6\" href=\"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-content\/uploads\/sites\/26054\/2025\/05\/CYSE525-Policy-Analysis-1-2.pdf\">CYSE525-Policy-Analysis-1-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-content\/uploads\/sites\/26054\/2025\/05\/CYSE525-Policy-Analysis-1-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-fb0c6198-c29b-4905-b85a-ab3eaf48a9a6\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-content\/uploads\/sites\/26054\/2025\/05\/CYSE525-Policy-Analysis-2-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE525-Policy-Analysis-2-1.\"><\/object><a id=\"wp-block-file--media-a20b132f-d767-46e3-ab0e-225252222aed\" href=\"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-content\/uploads\/sites\/26054\/2025\/05\/CYSE525-Policy-Analysis-2-1.pdf\">CYSE525-Policy-Analysis-2-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-content\/uploads\/sites\/26054\/2025\/05\/CYSE525-Policy-Analysis-2-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a20b132f-d767-46e3-ab0e-225252222aed\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-content\/uploads\/sites\/26054\/2025\/05\/cyse525-policy-analysis-3.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of cyse525-policy-analysis-3.\"><\/object><a id=\"wp-block-file--media-ed4a16c9-673d-475a-b241-abcbf8f39036\" href=\"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-content\/uploads\/sites\/26054\/2025\/05\/cyse525-policy-analysis-3.pdf\">cyse525-policy-analysis-3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-content\/uploads\/sites\/26054\/2025\/05\/cyse525-policy-analysis-3.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ed4a16c9-673d-475a-b241-abcbf8f39036\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-content\/uploads\/sites\/26054\/2025\/05\/CYSE525-Policy-Analysis-4-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE525-Policy-Analysis-4-1.\"><\/object><a id=\"wp-block-file--media-bc838ab1-c4e1-42ac-8856-20efcf5b55c9\" href=\"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-content\/uploads\/sites\/26054\/2025\/05\/CYSE525-Policy-Analysis-4-1.pdf\">CYSE525-Policy-Analysis-4-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-content\/uploads\/sites\/26054\/2025\/05\/CYSE525-Policy-Analysis-4-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-bc838ab1-c4e1-42ac-8856-20efcf5b55c9\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-content\/uploads\/sites\/26054\/2025\/05\/CYSE-525-Policy-Analysis-5-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE-525-Policy-Analysis-5-1.\"><\/object><a id=\"wp-block-file--media-be4d18a7-fdc0-41fd-9116-4ecf0d21ee0c\" href=\"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-content\/uploads\/sites\/26054\/2025\/05\/CYSE-525-Policy-Analysis-5-1.pdf\">CYSE-525-Policy-Analysis-5-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-content\/uploads\/sites\/26054\/2025\/05\/CYSE-525-Policy-Analysis-5-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-be4d18a7-fdc0-41fd-9116-4ecf0d21ee0c\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Strategy and Policy Course Description: This course explores cybersecurity policy and strategy and introduces students to the essentials of strategy development and policy making in cybersecurity. Topics considered include planning principles in cyber strategy; risk management and cybersecurity policy; the connections between cybersecurity policies, businesses, and governmental institutions; the knowledge, skills, and abilities needed&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/brendopierce\/ece-416\/\">Read More<\/a><\/div>\n","protected":false},"author":21883,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-json\/wp\/v2\/pages\/231"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-json\/wp\/v2\/users\/21883"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-json\/wp\/v2\/comments?post=231"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-json\/wp\/v2\/pages\/231\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-json\/wp\/v2\/pages\/231\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brendopierce\/wp-json\/wp\/v2\/media?parent=231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}