Economics of Cybersecurity: Solutions | TU Delft Online (2024)

About this online course

Overview

Cybersecurity breaches are the outcome of bad incentives. This course teaches you how to think about rational security investments, aligning security with the business strategy, insurance, incident response and much more. As well as individual organizations, it also covers solutions to address market failures.

This course brings together state-of-the-art expertise on solutions to cybersecurity failures at both organization and market levels.

Organizations face difficult decisions about how to manage the cybersecurity risks that they face. How much should you spend on security? How can you align security with your business strategy? What is a rational approach to managing your vulnerabilities? Should you adopt cyber insurance? After you have suffered an incident, is it better to go public or to keep it a secret?

This course, provides you with a clear way of thinking about these issues, supporting you to make better decisions. It trains professionals in IT and business to think about investment decisions, risk mitigation and insurance. It also provides boardroom-level executives with the training required under NIS2.

These issues extend beyond the individual organization. Market failures are everywhere in cybersecurity. Information asymmetry, adverse selection and externalities cause inefficient markets and mean that the costs and benefits of security risks are distributed unequally. Some organizations capture the benefits, while the consequences are suffered by others.

How can these market failures be addressed? The last part of the course focuses on policy interventions. We explain when ex ante regulations are effective and when it is more efficient to rely on ex post liability. A lot of new regulation in the US, EU and Asia relies on certification. Does this actually work? We bring together insights into a response that is often overlooked: encouraging voluntary action by firms. These insights enable policymakers and decision makers to design better policies to improve the cybersecurity of our economy and the country at large.

What You'll Learn

After completion of the course, participants should be in a position to:

  1. Define the main organization-level solutions to security failures
  2. Evaluate the strengths and weaknesses of each organization-level solution in a specific context
  3. Define the main market-level solutions to security failures
  4. Evaluate the strengths and weaknesses of each market-level solution in a specific context

Details

Course Syllabus

Week 1:
In this week we will introduce key concepts for the field of security and risk management. We will also investigate what security investments are and the decision-making process associated with them.
Topics covered this week:

  • Security and risk management per-breach
  • Decision theory for security investments
  • Security investments and organization politics

Week 2:
This week we will describe the different security providers’ functions and specifically focus on what cyber insurance is, as well as what possibilities there are to transfer cyber security risk.
Topics covered this week:

  • Focus on security providers
  • Cyber insurance 101
  • A closer look at cyber risk transfer

Week 3:
In this week we continue our investigation of cyber risk by looking into the different risk information sharing principles and what barriers there are that inhibit it. We conclude this section with a close look at post-breach security strategies.
Topics covered this week:

  • Cyber risk information sharing
  • Barriers to cyber risk information sharing
  • Security and risk management post-breach

Week 4:
This week we will explain the different policy intervention approaches at an organizational level. We will dive deep into ex-ante safety regulations as well as ex-post liability.
Topics covered this week:

  • Policy intervention overview
  • Ex ante safety regulations
  • Ex post liability

Week 5:
The focus of this week is on analyzing the process of certifying products and the potential issues that arise from the certification process. We will also discuss what information disclosure is and its effects.
Topics covered this week:

  • Certifying products
  • Certifying processes
  • Information disclosure

Week 6:
In this final week we will conclude the analysis of different security solutions, by looking into what data protection and breach disclosure tries to achieve, what voluntary actions are taken in practice, and what incentives are included in policy regulations. We conclude this section with a quick look at other policy responses, that we have not investigated in detail in this course.
Topics covered this week:

  • Data protection and breach disclosure
  • Voluntary actions
  • Regulatory “carrots”
  • Other policy responses

Qualifications

Certificates

If you successfully complete this course you will earn a professional education certificate and you are eligible to receive 2.5Continuing Education Units (CEUs).

Economics of Cybersecurity: Solutions | TU Delft Online (1)View sample certificateEconomics of Cybersecurity: Solutions | TU Delft Online (2)

Admission

This course is primarily geared towards working professionals.

Prerequisites:

Participants are encouraged to combine this course with the course “Economics of Cybersecurity: Foundations and Measurements” and “Economics of Cybersecurity: Solutions”.

Contact

If you have any questions about this course or the TU Delft online learning environment, please visit ourpage.

Enroll now Enroll with STAP

Start your Enrollment

  • Start date
    Mar 05, 2025
  • Course Fee
    € 1050.00

NEXT STEPS:
1) Make your payment through credit card, PayPal, iDeal or bank transfer
2) You will be given access to the course shortly before start date

Continue

Cancel

Start your Enrollment with STAP

  • Start date
    Mar 05, 2025
  • Course Fee
    €1050.00 €0

Warning

Please only continue when applying with STAP budget. For more information see our STAP page.

If you are not applying with STAP budget, please click the CANCEL button and enroll again by clicking the ENROLL NOW button.

NEXT STEPS:
1) You will receive a STAP Aanmeldbewijs (registration certificate) via email. For further instructions read this email carefully.
2) If eligible, you will be given access to the course shortly before start date.

Continue

Cancel

  • Create Account

    Login

Note: if you do not have an account, first create one. You will receive a confirmation email with a link to activate it.
After clicking the activation link, click the Start Admission/Enroll button on the course page to continue your enrollment.

  • Starts: Mar 05, 2025
  • Fee: €1050
  • Group fee: contact us
  • Enrollment open until: Feb 26, 2025
  • Length: 6 weeks
  • Effort: 4 - 6 hours per week

Show all details

Related courses and programs

Learn moreEconomics of Cybersecurity: Foundation and MeasurementLearn why cybersecurity failures occur and recur in your organization and how to remediate them. Identify the economic …PE6 weeksno logic Oct 02, 2024
Learn moreEconomics of Cybersecurity: Users and AttackersAre humans the weakest link in cybersecurity? Using an economics perspective, this course will give you the latest insi…PE6 weeksno logic Jan 08, 2025
Learn moreCybersecurity for Managers and Executives: Taking the LeadThis course will equip you with the framework, vocabulary and understanding of cyber risks, and will give you the confi…PE5 weeksno logic Future dates to be announced
Economics of Cybersecurity: Solutions | TU Delft Online (2024)
Top Articles
Body Void Drops Off Remaining Tour Dates With Liturgy… Without Notifying Liturgy First
55Th And Kedzie Elite Staffing
Frases para un bendecido domingo: llena tu día con palabras de gratitud y esperanza - Blogfrases
Pollen Count Los Altos
Tattoo Shops Lansing Il
Was ist ein Crawler? | Finde es jetzt raus! | OMT-Lexikon
Cottonwood Vet Ottawa Ks
J & D E-Gitarre 905 HSS Bat Mark Goth Black bei uns günstig einkaufen
Voorraad - Foodtrailers
Craigslist Pet Phoenix
Best Transmission Service Margate
Produzione mondiale di vino
Top Golf 3000 Clubs
Joe Gorga Zodiac Sign
Lesson 3 Homework Practice Measures Of Variation Answer Key
LA Times Studios Partners With ABC News on Randall Emmett Doc Amid #Scandoval Controversy
Max 80 Orl
4Chan Louisville
Mycarolinas Login
Shooting Games Multiplayer Unblocked
Tracking Your Shipments with Maher Terminal
Walmart Double Point Days 2022
24 Best Things To Do in Great Yarmouth Norfolk
Does Breckie Hill Have An Only Fans – Repeat Replay
ARK: Survival Evolved Valguero Map Guide: Resource Locations, Bosses, & Dinos
Lazarillo De Tormes Summary and Study Guide | SuperSummary
U Break It Near Me
Juicy Deal D-Art
Samantha Aufderheide
Gotcha Rva 2022
Maine Racer Swap And Sell
Pixel Combat Unblocked
Skepticalpickle Leak
Mawal Gameroom Download
Die wichtigsten E-Nummern
Prévisions météo Paris à 15 jours - 1er site météo pour l'île-de-France
Duke Energy Anderson Operations Center
Fairwinds Shred Fest 2023
Leland Nc Craigslist
Devotion Showtimes Near Mjr Universal Grand Cinema 16
Powerspec G512
Is Arnold Swansinger Married
Wayne State Academica Login
Сталь aisi 310s российский аналог
Armageddon Time Showtimes Near Cmx Daytona 12
Lamont Mortuary Globe Az
Lyons Hr Prism Login
Dlnet Deltanet
Dayton Overdrive
Urban Airship Acquires Accengage, Extending Its Worldwide Leadership With Unmatched Presence Across Europe
Tamilblasters.wu
Factorio Green Circuit Setup
Latest Posts
Article information

Author: Corie Satterfield

Last Updated:

Views: 6800

Rating: 4.1 / 5 (42 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Corie Satterfield

Birthday: 1992-08-19

Address: 850 Benjamin Bridge, Dickinsonchester, CO 68572-0542

Phone: +26813599986666

Job: Sales Manager

Hobby: Table tennis, Soapmaking, Flower arranging, amateur radio, Rock climbing, scrapbook, Horseback riding

Introduction: My name is Corie Satterfield, I am a fancy, perfect, spotless, quaint, fantastic, funny, lucky person who loves writing and wants to share my knowledge and understanding with you.