woman and man in a server room

Cybersecurity Risk Management Certificate

Program Details

Degree

Certificate

Department

School of Business Graduate Program

Available

On Campus & Online

Contact

Office of Graduate Admissions1-888.511.1306[email protected]
Apply Now

The rapid introduction of new technologies into the enterprise has helped companies enter new markets, connect with customers in more meaningful ways and seize new opportunities. But these advantages have also introduced new risks and vulnerabilities, with interconnected networks offering multiple points of entry for dedicated attackers searching for valuable data. The management of cybersecurity risk has become a core operational concern, requiring an effective partnership of both business and technical leaders within the organization, as well as effective collaboration with external parties — including interconnected business partners and customers.  

Stevens brings an established tradition of leadership in cybersecurity to its interdisciplinary graduate certificate in Cybersecurity Risk Management. This program is designed to demonstrate methods to analyze cybersecurity risks in organizations using a multidisciplinary approach, including the examination of fundamentals; prevailing legal and regulatory frameworks; and risk analysis techniques to provide a basis for understanding the nature and technical complexities of interconnected, and therefore interdependent, systems, organizations, and markets. The curriculum's mix of business and computer science classes positions students to become leaders capable of shaping cyber strategy across the enterprise. 

Upon completion of this certificate, students will be able to: 

  • Apply concepts of risk management to the organizational cybersecurity context.

  • Analyze enterprise cybersecurity requirements.

  • Understand the impact of cybersecurity laws and industry-specific regulations on organizational planning. 

  • Evaluate complexities created by the network interconnection of firms and markets.

  • Continuously monitor the threat landscape and adjust the enterprise cybersecurity strategy accordingly.