1 hour 2 minutes
and welcome to revenue protection as a C. So
my name is Terrence Jackson, and I am the sea so of narcotics software. I have over 16 years of I T and security experience working in both the public and private sectors.
Um, started off working as, ah, you know, system admin. Work my way up that work at MIT and system engineer.
I always had a curious mindset. Even as a kid, I would take my toys apart. That will frustrate the *** out of my parents.
Um, but I always had that. That curiosity about what made things take, um, my first computer was a Commodore 64.
And you know, as they say, the rest is history.
I hope to lead you through this course
and helping you turn what is traditionally seen as a cost centre into,
um, an area of excellence that generates revenue. I know this sounds a little odd, but it can be done.
My hobbies include golfing, watching Marvel movies and spending time with my family.
The prerequisites for this course are as follows. Seven years of information technology experience 3 to 5 years of project management experience,
familiarity with regulatory and privacy regulations such as GDP R C C P A,
um, experience managing budgets
that will help,
when you are trying to justify more budget, it's managing what you have, right. Um, Kelly hand the hand, which is also a cyber very instructor has an excellent see So course, um
and there are a couple of modules the modules that are geared towards risk and risk management and governance. I would suggest that you take
Ah, look at the entire course is great, but, um but specifically, pay attention to those modules on risk.
And last but not least, that will lead us into, uh, DRC concepts of governance, risk and compliance concepts.
The materials that we will be referencing during this course are psychotics. Isso Got to success. The new C so by the Lloyd,
the Open Compliance, An Ethic Group, Red Book and the National Association of Corporate Directors Cyber Risk Oversight
The target audience for this course our first time. See souls see so stepping into a company that didn't have a price, a curated leader or formal security program
and C cells looking to generate revenue from the security program,
our learning objectives will be to understand what the business suspects from the sea. So how to communicate in business language, how to identify opportunities to protect and potentially generate revenue and how to gain stakeholder by in and build trust.
Thank you for tuning in. I look for
to taking you down the path of how to generate and protect revenue as a C. So