{"id":576,"date":"2024-08-26T00:15:58","date_gmt":"2024-08-26T00:15:58","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ecorpus\/?page_id=576"},"modified":"2024-11-01T14:52:25","modified_gmt":"2024-11-01T14:52:25","slug":"cyse-425w","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ecorpus\/cyse-425w\/","title":{"rendered":"&#8211; CYSE 425W &#8211;"},"content":{"rendered":"\n<p>This course explores cybersecurity policy and strategy and introduces students to the essentials of strategy development and policy making in cybersecurity. Topics considered include planning principles in cyber strategy; risk management and cybersecurity policy; the connections between cybersecurity policies, businesses, and governmental institutions; the knowledge, skills, and abilities needed to develop and implement cybersecurity policy; the social, political and ethical implications that arise in cybersecurity policies and strategies; strategies to assess cybersecurity policy; and the ties between national security and cybersecurity policy.<\/p>\n\n\n\n<p>Throughout this course, I engaged in in-depth policy analysis and strategic planning exercises, focusing on cybersecurity at the national and organizational levels. My work involved understanding and assessing real-world policies, such as the CISA National Cybersecurity Strategic Plan (FY2024-2026), and exploring how these policies are implemented to protect national security and critical infrastructure.<\/p>\n\n\n\n<p>One of the primary components of this course was completing six Policy Analysis Papers, each addressing a different facet of cybersecurity policy. These papers provided me with a structured approach to critically analyzing cybersecurity strategies and the implications of policy decisions on national and organizational security. By analyzing current and proposed policies, I gained insights into the complexities of cybersecurity governance and the challenges of balancing security with privacy and ethical considerations.<\/p>\n\n\n\n<p><strong>Skills and Values:<\/strong><\/p>\n\n\n\n<p>Policy Analysis and Critical Thinking: Developed the ability to critically analyze cybersecurity policies, assess their effectiveness, and understand the implications of many policy decisions.<\/p>\n\n\n\n<p>Strategic Planning: Gained skills in evaluating and contributing to cybersecurity strategies that align with national security and organizational goals.<\/p>\n\n\n\n<p>Ethical Awareness and Legal Compliance: Enhanced my understanding of the ethical, legal, and societal considerations that shape cybersecurity policies, especially those that impact privacy.<\/p>\n\n\n\n<p>Communication and Reporting: Learned to communicate complex policy analysis findings effectively, a skill crucial for roles in governance, risk, and compliance (GRC).<\/p>\n\n\n\n<p><strong>Policy Analysis Paper 1<\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/ecorpus\/wp-content\/uploads\/sites\/36626\/2024\/08\/annotated-Policy20Analysis201.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-Policy20Analysis201<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong>Policy Analysis Paper 2<\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/ecorpus\/wp-content\/uploads\/sites\/36626\/2024\/08\/annotated-Policy20Analysis2022028129.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-Policy20Analysis2022028129<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong>Policy Analysis Paper 3<\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/ecorpus\/wp-content\/uploads\/sites\/36626\/2024\/08\/annotated-Policy20Analysis2032028129.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-Policy20Analysis2032028129<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong><strong>Policy Analysis Paper <\/strong>4<\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/ecorpus\/wp-content\/uploads\/sites\/36626\/2024\/08\/annotated-Policy20Analysis2042028229.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-Policy20Analysis2042028229<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong>Policy Analysis Paper 5<\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/ecorpus\/wp-content\/uploads\/sites\/36626\/2024\/08\/annotated-Policy20Analysis205.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-Policy20Analysis205<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This course explores cybersecurity policy and strategy and introduces students to the essentials of strategy&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/ecorpus\/cyse-425w\/\">Read the post<span class=\"screen-reader-text\">&#8211; CYSE 425W &#8211;<\/span><\/a><\/div>\n","protected":false},"author":21866,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ecorpus\/wp-json\/wp\/v2\/pages\/576"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ecorpus\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ecorpus\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ecorpus\/wp-json\/wp\/v2\/users\/21866"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ecorpus\/wp-json\/wp\/v2\/comments?post=576"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/ecorpus\/wp-json\/wp\/v2\/pages\/576\/revisions"}],"predecessor-version":[{"id":712,"href":"https:\/\/sites.wp.odu.edu\/ecorpus\/wp-json\/wp\/v2\/pages\/576\/revisions\/712"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ecorpus\/wp-json\/wp\/v2\/media?parent=576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}