A growing trend in the cybersecurity industry is rooted in educating everyone about the risks of a cyber attack.
Universities around the world are developing undergrad and graduate degree programs, professional mentors are engaging with high school students, girls are coding. Everyone’s getting in on cybersecurity awareness, particularly as it relates to business risk.
That’s why MIT is launching a new online course for business professionals titled, Cybersecurity: Technology, Application and Policy.
MIT Professor Howard Shrobe, director of cybersecurity and a principal research scientist at MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL), said, “We created this course to tackle the ever-important issue of cybersecurity. Cyber-attacks continue to occur and we are basically stuck in what I often refer to as “cyber hell”, paying this reactive game of catch-up in which bad actors always seem to have the advantage.”
MIT’s mission is to move organizations away from the current “patch and pray” approach toward security by default, where attacks are managed in a proactive and systematic way.
In order to accomplish that goal, “We must educate professionals from a variety of perspectives, including technology, public policy and organizational management,” said Shrobe.
Because new technologies will require new policies and incentives, and emerging policies must adapt to future technologies, “We have brought together a pool of world-renowned faculty cybersecurity experts from MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) and the Sloan School of Management to teach this online course,” Shrobe said.
The six-week course offers a holistic, comprehensive view of key technologies, techniques and systems. The goal, said Shrobe, is for participants to walk away with a broad understanding of hardware, software, cryptography, and policy to make better, safer long-term security decisions.
“Some of the research we focus on is about creating systems that are harder to hack. We’ve demonstrated that it is possible to design a modern computer system that attackers can’t break into…