Time
1 hour 2 minutes
Difficulty
Advanced
CEU/CPE
1

Video Transcription

00:01
hello
00:02
and welcome to revenue protection as a C. So
00:11
my name is Terrence Jackson, and I am the sea so of narcotics software. I have over 16 years of I T and security experience working in both the public and private sectors.
00:23
Um, started off working as, ah, you know, system admin. Work my way up that work at MIT and system engineer.
00:31
I always had a curious mindset. Even as a kid, I would take my toys apart. That will frustrate the *** out of my parents.
00:38
Um, but I always had that. That curiosity about what made things take, um, my first computer was a Commodore 64.
00:47
And you know, as they say, the rest is history.
00:52
Um,
00:53
I hope to lead you through this course
00:58
and helping you turn what is traditionally seen as a cost centre into,
01:03
um, an area of excellence that generates revenue. I know this sounds a little odd, but it can be done.
01:14
My hobbies include golfing, watching Marvel movies and spending time with my family.
01:26
The prerequisites for this course are as follows. Seven years of information technology experience 3 to 5 years of project management experience,
01:37
familiarity with regulatory and privacy regulations such as GDP R C C P A,
01:44
um, experience managing budgets
01:47
that will help,
01:49
Um,
01:51
when you are trying to justify more budget, it's managing what you have, right. Um, Kelly hand the hand, which is also a cyber very instructor has an excellent see So course, um
02:04
and there are a couple of modules the modules that are geared towards risk and risk management and governance. I would suggest that you take
02:13
Ah, look at the entire course is great, but, um but specifically, pay attention to those modules on risk.
02:22
And last but not least, that will lead us into, uh, DRC concepts of governance, risk and compliance concepts.
02:30
The materials that we will be referencing during this course are psychotics. Isso Got to success. The new C so by the Lloyd,
02:39
the Open Compliance, An Ethic Group, Red Book and the National Association of Corporate Directors Cyber Risk Oversight
02:49
2020.
02:52
The target audience for this course our first time. See souls see so stepping into a company that didn't have a price, a curated leader or formal security program
03:02
and C cells looking to generate revenue from the security program,
03:08
our learning objectives will be to understand what the business suspects from the sea. So how to communicate in business language, how to identify opportunities to protect and potentially generate revenue and how to gain stakeholder by in and build trust.
03:28
Thank you for tuning in. I look for
03:30
to taking you down the path of how to generate and protect revenue as a C. So
03:37
thank you.

Up Next

Revenue Protection as a CISO

In this course you will learn strategies to transform the way your security program is viewed.

Instructed By

Instructor Profile Image
Terence Jackson
Chief Information Security and Privacy Officer
Instructor