2024 Cybersecurity Governance

Font size  SML

Register update notification mail Add to favorite lecture list
Academic unit or major
School of Computing
Instructor(s)
Tanaka Keisuke  Mamiya Masayuki 
Class Format
Lecture / Exercise     
Media-enhanced courses
Day/Period(Room No.)
-
Group
-
Course number
XCO.T478
Credits
2
Academic year
2024
Offered quarter
4Q
Syllabus updated
2024/3/28
Lecture notes updated
-
Language used
Japanese
Access Index

Course description and aims

With the development of information and communications networks and the advanced use of information and communications technology, represented by the Internet, threats to cybersecurity are becoming more serious. Cyber attacks continue to have a significant impact on society, and the damage to society caused by the leakage of personal information and the leakage of intellectual property by attacks is immense. Despite the importance of cybersecurity, there is still a significant shortage of human resources.
In response to these social demands, Tokyo Institute of Technology established the Cybersecurity Special Program in April 2016. This special training program on cybersecurity will provide students with practical knowledge on cybersecurity through collaboration with Rakuten, NTT, AIST, and the Cabinet Cybersecurity Center, as well as with knowledge on the theoretical background by utilizing the strengths of the theoretical field, which is characteristic of the information and communications field at Tokyo Tech. The curriculum is centered around six subjects: Cybersecurity Overview (1Q, 2-0-0), Cybersecurity Cryptography (3Q, 2-0-0), Cybersecurity Governance (4Q, 1-1-0), Cybersecurity Attack and Defense I (2Q, 1-1-0), Cybersecurity Attack and Defense II (3Q, 1-1-0), and Cybersecurity Attack and Defense III (4Q, 1-1-0).
In this course, you will understand the basic framework of management measures related to information security and learn how to conduct corporate governance with security in mind.

Student learning outcomes

By completing this lecture, the following are understood and the way of thinking is acquired.
1)You will understand the management framework for information security
2)You will be able to understand the specific security measures for corporate governance
3)You will be able to plan for information security
4)You will be able to make recommendations, support and report to management.

Course taught by instructors with work experience

Applicable How instructors' work experience benefits the course
The lecturer will give practical lectures on cybersecurity governance based on his experience in information security management acquired in the private sector and his knowledge as a cybersecurity auditor acquired in government agencies.
In a case study, consider "What should a CISO be?" and "How staff can help CISOs" using actual cases that the instructor worked on.

Keywords

Security, Information Security, Cyber Security, Governance, Incident Handling, Risk Management, IoT, Information Security Audit, Security, CISO, Cyber Security Framework, Case Methods

Competencies that will be developed

Specialist skills Intercultural skills Communication skills Critical thinking skills Practical and/or problem-solving skills
By completing this course, students will have the extensive knowledge and perspective required for cybersecurity governance.

Class flow

These classes are taught through lectures and dialogues, group discussions, and case methods. In the case method, students conduct their own research and analysis, and teachers and students "discuss" each other in class.

Course schedule/Required learning

  Course schedule Required learning
Class 1 Orientation, the basic idea of cybersecurity governance Students will understand the framework needed to think about cybersecurity governance.
Class 2 Our country's Cybersecurity Environment and Initiatives Students will gain an understanding of the cybersecurity environment surrounding our country, as well as public and private initiatives and national security.
Class 3 "Organization and rules" for cybersecurity governance Students will understand how to build the organizations, rules and institutions that are prerequisites for establishing cybersecurity governance. In addition, students will understand psychological factors, human resources and labor, and public relations activities that should be kept in mind when managing group companies and overseas offices, and managing information security.
Class 4 ”Education and training" for cybersecurity governance Students will understand the education and training required to establish cybersecurity governance. Students will also understand how to secure and develop advanced security personnel.
Class 5 "Technology and equipment" for cybersecurity governance Students will understand the technical measures and facilities needed to establish cybersecurity governance.
Class 6 "Audit and inspection" for cybersecurity governance Students will understand the audits and inspections required to establish cybersecurity governance. In addition, think about utilizing the results of audits and inspections, and understand the development of information security response plans and risk control.
Class 7 Embedded Systems and Cybersecurity Governance Today, various industrial devices and cars are connected to the Internet and exchange information with each other. Sensors, actuators, and the like may be incorporated into the system and function as a control system. Understand the characteristics of embedded systems and their cybersecurity vulnerabilities and countermeasures.
Class 8 Healthcare Systems and Cybersecurity Governance Students will understand the characteristics of healthcare systems and their cybersecurity vulnerabilities and countermeasures.
Class 9 Cybersecurity governance essentials and CISO qualities Students will understand the requirements needed to establish cybersecurity governance and the qualities and capabilities required of a CISO. Students also understand the qualities and abilities expected of the staff who support CISOs.
Class 10 Responding to and managing information security incidents Students will understand how to handle information security incidents.
Class 11 Case 1 Domestic Incident Case 1 Using actual incident cases as teaching materials, the CISO will discuss with the participants and instructors to come up with the best course of action. It also understands what people and organizations did until the worst happened and why they make poor decisions. Through the analysis of actual domestic cases, the theory and practice learned so far are linked. In addition, since there is often no single solution to a problem, it is possible to enrich one's own knowledge from multiple perspectives, experiences, and perspectives of others.
Class 12 Case 2 Domestic Incident Case 2 Using actual incident cases as teaching materials, the CISO will discuss with the participants and instructors to come up with the best course of action. It also understands what people and organizations did until the worst happened and why they make poor decisions. Through the analysis of actual domestic cases, the theory and practice learned so far are linked. In addition, since there is often no single solution to a problem, it is possible to enrich one's own knowledge from multiple perspectives, experiences, and perspectives of others.
Class 13 Case 3: Foreign Incident Case Using actual incident cases as teaching materials, the CISO will discuss with the participants and instructors to come up with the best course of action. It also understands what people and organizations did until the worst happened and why they make poor decisions. Through the analysis of cases that have actually occurred overseas, the theory and practice learned so far are linked. In addition, since there is often no single solution to a problem, it is possible to enrich one's own knowledge from multiple perspectives, experiences, and perspectives of others.
Class 14 Completion presentation The student makes a presentation to demonstrate the results of his or her previous study in response to a given assignment. But if there are a lot of students, they may turn it into a report.

Out-of-Class Study Time (Preparation and Review)

In order to obtain a higher level of learning effect, it is recommended that the participants refer to the relevant parts of the handouts, reference books, etc., and prepare for and review the course content for approximately 60 minutes.

Textbook(s)

Textbooks will not be used in this course.

Reference books, course materials, etc.

References will be announced in the classes.

Assessment criteria and methods

The assessment method is the percentage of correct answers on a quiz to check your understanding of the lesson. A presentation or report evaluation to be given on completion. In addition, consider attendance and participation (active and constructive speech and listening to what others say). These factors are combined for a comprehensive evaluation.

Related courses

  • XCO.T473 : Foundation of Cybersecurity
  • XCO.T474 : Theory of Cryptography for Cybersecurity
  • XCO.T475 : Attack and Defense on Cybersecurity I
  • XCO.T476 : Attack and Defense on Cybersecurity II
  • XCO.T477 : Attack and Defense on Cybersecurity III

Prerequisites (i.e., required knowledge, skills, courses, etc.)

There is no knowledge, skills or subjects taken as a condition for taking the course. A basic knowledge of computer science concepts and networks will help you understand them.

Contact information (e-mail and phone)    Notice : Please replace from "[at]" to "@"(half-width character).

keisuke[at]is.titech.ac.jp

Office hours

Appointment by e-mail is required.

Page Top