Economics of Cybersecurity: Foundation and Measurement | TU Delft Online (2024)

About this online course

Overview

Learn why cybersecurity failures occur and recur in your organization and how to remediate them. Identify the economic investments that produce security successes. Develop a practical framework for measuring security and its driving factors.

Organizations face daily cybersecurity risks, such as ransomware, data leaks, and compromised emails. Often, the focus is on compliance with industry standards rather than addressing internal vulnerabilities. Effective security requires understanding the incentives for stakeholders, not just relying on technology.

This course covers key economic concepts to present security incentives within organizations and the broader ecosystem of suppliers, customers and IT providers. It examines the reasons behind recurring cybersecurity failures and uses case studies to explore and prevent these lapses. You'll learn to identify essential economic investments for security, to allocate resources efficiently, and make informed decisions balancing security needs with financial constraints.

Furthermore, the course covers the critical aspect of measuring security. Accurate measurement is essential to determine the effectiveness of your policies and identify best practices. Without it, investments are based on inputs like maturity frameworks and compliance rather than actual outcomes. Our course provides a causal framework for understanding security incidents, drawing on numerous empirical studies that show how specific interventions and policies impact security. You will learn to develop and evaluate metrics and KPIs related to your security initiatives. This framework will help you track progress, identify areas for improvement and demonstrate the value of your security investments to stakeholders.

With new laws like NIS2 requiring cybersecurity training, this course is ideal for professionals in IT management, auditing, compliance, risk governance and related fields. By the end, you'll be prepared to proactively address cybersecurity challenges and enhance your organization's resilience against threats.

What You'll Learn

After completion of the course, participants are in a position to:

  1. Explain why certain security failures occur and persist in organizations
  2. Identify the incentives that can help prevent security failures
  3. Use a causal framework for security incidents that helps to develop metrics for the factors that increase or decrease the risk of failure
  4. Distinguish supposed “best practices” from actual evidence on which security measures are effective

Details

Course Syllabus

Week 1:
In this week we will introduce the concepts of cybersecurity economics, the associated costs, and decision making involved.
Topics covered in this week:

  • Introduction to the program and course specific topics
  • Explanation of the costs of security failures
  • Discussion of security decisions at the margins

Week 2:
This week’s focus is on the different aspects of market failures. We will explain effects of both negative and positive externalities, and how information asymmetry could play a role.
Topics covered this week:

  • The effects of negative externalities
  • Understanding positive externalities
  • Explanation of information asymmetry

Week 3:
In this week we wrap up the economic foundations by looking at market power and its effects on security. We also describe the role that governmental interventions play and how those could lead to failures.
Topics covered this week:

  • Explaining monopolies and market power
  • Understanding governmental failures

Week 4:
In this week we will introduce a causal framework for thinking about the relationship between attacks, security, exposure, compromise and harm. This provides the foundation for thinking about measurement. We will also discuss the effect that different study sizes have on results and how to measure compromise.
Topics covered this week:

  • Introduction to the causal model
  • Explaining sample size effect on results
  • Measuring compromise

Week 5:
The focus of this week will be on key measurement variables associated with cybersecurity. We will look at how to measure harm, why exposure is important for a measurement study, and how threat levels vary.
Topics covered this week:

  • Measuring harm
  • The importance of exposure
  • What is threat and how is it measured

Week 6:
In this final week, we discuss what security data is available and look at a specific case study, where the previously introduced concepts are put to work.
Topics covered this week:

  • Recognizing different types of security data
  • Applying the concepts to a real-life case study

Qualifications

Certificates

If you successfully complete this course you will earn a professional education certificate and you are eligible to receive 2.5 Continuing Education Units (CEUs).


Economics of Cybersecurity: Foundation and Measurement | TU Delft Online (1)View sample certificateEconomics of Cybersecurity: Foundation and Measurement | TU Delft Online (2)

Admission

This course is primarily geared towards working professionals.

Prerequisites:

None

Contact

If you have any questions about this course or the TU Delft online learning environment, please visit ourpage.

Enroll now Enroll with STAP

Start your Enrollment

  • Start date
    Oct 02, 2024
  • Course Fee
    € 1050.00

NEXT STEPS:
1) Make your payment through credit card, PayPal, iDeal or bank transfer
2) You will be given access to the course shortly before start date

Continue

Cancel

Start your Enrollment with STAP

  • Start date
    Oct 02, 2024
  • Course Fee
    €1050.00 €0

Warning

Please only continue when applying with STAP budget. For more information see our STAP page.

If you are not applying with STAP budget, please click the CANCEL button and enroll again by clicking the ENROLL NOW button.

NEXT STEPS:
1) You will receive a STAP Aanmeldbewijs (registration certificate) via email. For further instructions read this email carefully.
2) If eligible, you will be given access to the course shortly before start date.

Continue

Cancel

  • Create Account

    Login

Note: if you do not have an account, first create one. You will receive a confirmation email with a link to activate it.
After clicking the activation link, click the Start Admission/Enroll button on the course page to continue your enrollment.

  • Starts: Oct 02, 2024
  • Fee: €1050
  • Group fee: contact us
  • Enrollment open until: Sep 25, 2024
  • Length: 6 weeks
  • Effort: 4 - 6 hours per week

Show all details

Related courses and programs

Learn moreEconomics of Cybersecurity: Users and AttackersAre humans the weakest link in cybersecurity? Using an economics perspective, this course will give you the latest insi…PE6 weeksno logic Jan 08, 2025
Learn moreEconomics of Cybersecurity: SolutionsCybersecurity breaches are the outcome of bad incentives. This course teaches you how to think about rational security …PE6 weeksno logic Mar 05, 2025
Learn moreCybersecurity for Managers and Executives: Taking the LeadThis course will equip you with the framework, vocabulary and understanding of cyber risks, and will give you the confi…PE5 weeksno logic Future dates to be announced
Economics of Cybersecurity: Foundation and Measurement | TU Delft Online (2024)
Top Articles
Destiny 2: Solar 3.0 Hunter Melhores construções, aspectos e fragmentos
Police conduct 'chilling' raid of Kansas newspaper, publisher's home
Evil Dead Movies In Order & Timeline
Hotels Near 6491 Peachtree Industrial Blvd
Busted Newspaper Zapata Tx
Breaded Mushrooms
How Many Cc's Is A 96 Cubic Inch Engine
How to know if a financial advisor is good?
Craigslist Pet Phoenix
Hallelu-JaH - Psalm 119 - inleiding
Sports Clips Plant City
Identogo Brunswick Ga
Burn Ban Map Oklahoma
Viha Email Login
Maplestar Kemono
Mflwer
Khiara Keating: Manchester City and England goalkeeper convinced WSL silverware is on the horizon
Jenna Ortega’s Height, Age, Net Worth & Biography
Wnem Tv5 Obituaries
Craigslist Maryland Trucks - By Owner
Craigslist Rentals Coquille Oregon
Evil Dead Rise Showtimes Near Sierra Vista Cinemas 16
Enduring Word John 15
Angel Haynes Dropbox
Jersey Shore Subreddit
Keshi with Mac Ayres and Starfall (Rescheduled from 11/1/2024) (POSTPONED) Tickets Thu, Nov 1, 2029 8:00 pm at Pechanga Arena - San Diego in San Diego, CA
Stickley Furniture
Guinness World Record For Longest Imessage
Busch Gardens Wait Times
Earthy Fuel Crossword
Grandstand 13 Fenway
A Man Called Otto Showtimes Near Carolina Mall Cinema
Www Violationinfo Com Login New Orleans
Tenant Vs. Occupant: Is There Really A Difference Between Them?
4083519708
Hotels Near New Life Plastic Surgery
Oxford Alabama Craigslist
Eastern New Mexico News Obituaries
Überblick zum Barotrauma - Überblick zum Barotrauma - MSD Manual Profi-Ausgabe
Craigslist Putnam Valley Ny
Noaa Marine Weather Forecast By Zone
Satucket Lectionary
Waco.craigslist
Lebron James Name Soundalikes
Stoughton Commuter Rail Schedule
Used Sawmill For Sale - Craigslist Near Tennessee
Poster & 1600 Autocollants créatifs | Activité facile et ludique | Poppik Stickers
Besoldungstabellen | Niedersächsisches Landesamt für Bezüge und Versorgung (NLBV)
Autozone Battery Hold Down
Tyrone Dave Chappelle Show Gif
sin city jili
BYU Football: Instant Observations From Blowout Win At Wyoming
Latest Posts
Article information

Author: Msgr. Benton Quitzon

Last Updated:

Views: 6802

Rating: 4.2 / 5 (43 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Msgr. Benton Quitzon

Birthday: 2001-08-13

Address: 96487 Kris Cliff, Teresiafurt, WI 95201

Phone: +9418513585781

Job: Senior Designer

Hobby: Calligraphy, Rowing, Vacation, Geocaching, Web surfing, Electronics, Electronics

Introduction: My name is Msgr. Benton Quitzon, I am a comfortable, charming, thankful, happy, adventurous, handsome, precious person who loves writing and wants to share my knowledge and understanding with you.