0% found this document useful (0 votes)
29 views24 pages

ISB-CYSL Brochure Batch 4

The Cybersecurity for Leaders program, starting on June 30, 2025, is a 16-week online course offered by ISB Online, designed to equip leaders with essential cybersecurity skills integrated with AI and Generative AI. The program addresses the growing demand for cybersecurity expertise in response to increasing cyber threats, providing a comprehensive curriculum that includes regulations, compliance, and practical tools. Participants will receive a digital certificate upon successful completion and gain access to the ISB Online Network for networking opportunities.

Uploaded by

prachetosh ghosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views24 pages

ISB-CYSL Brochure Batch 4

The Cybersecurity for Leaders program, starting on June 30, 2025, is a 16-week online course offered by ISB Online, designed to equip leaders with essential cybersecurity skills integrated with AI and Generative AI. The program addresses the growing demand for cybersecurity expertise in response to increasing cyber threats, providing a comprehensive curriculum that includes regulations, compliance, and practical tools. Participants will receive a digital certificate upon successful completion and gain access to the ISB Online Network for networking opportunities.

Uploaded by

prachetosh ghosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Cybersecurity

for Leaders
STARTS ON: 30 JUNE 2025

16 WEEKS + ONLINE
ISB ONLINE NETWORK

LEARN FROM

#1 B-SCHOOL
IN INDIA
SOURCE: FT GLOBAL MBA RANKING 2025

Integrated with
Generative AI

Integrated with
Generative AI
Programme Overview
The global information security market is projected to grow from $183 billion in
2024 to $292 billion by 2028, with a compound annual growth rate (CAGR) of 11.7%
(Gartner). This growth is driven by increasing cyber threats which continue to disrupt
critical services and infrastructure globally, the demand for skilled leaders capable of
detecting, mitigating and preventing cyber attacks is skyrocketing.

Recognising cybersecurity as a top priority for risk management and leadership,


ISB Online has launched the Cybersecurity for Leaders programme integrated with AI
and Generative AI to help you safeguard your business against the escalating
frequency and sophistication of cyber attacks. This strategically curated programme
offers a pathway to a high-growth career as a cybersecurity leader by teaching you
how to become proactive and versatile in this dynamic field.

This programme addresses this demand surge by offering you a comprehensive


cybersecurity curriculum that includes cybersecurity regulation and compliance as well
as the use of Generative AI and AI to improve decision-making, build robust teams and
become a fully equipped cybersecurity leader.

A Forrester survey revealed


that 78% of organisations
experienced at least one
breach in the past 12
months, up from 63% two
years prior. Notably, 22%
reported being breached six
to ten times within the same
period.
Programme Summary
Institute Name Programme Duration Cost Learning Mode Weekly Effort
ISB Online 16 Weeks INR 1,39,900 + GST Online 5-6 Hours a Week

Faculty Guest Faculty/ Programme Leader Eligibility Certificate


ISB Faculty Industry Experts Subject Matter Any Graduate/ Upon Successful Completion of
Senior Industry Experts/Mid-industry Diploma Holder the Programme, Participants Will Be
Practitioners Practitioners Awarded a Verified Digital
Certificate From ISB Online

Learning Experience

Pre-recorded videos with ISB Faculty - High-quality videos - On-demand learning -


Learn at your own pace, around your Great learning experience, even Re-watch any lesson/concept
busy schedule while on the move for deeper understanding

World-class faculty - Cohort-based learning -


Learn from the best faculty and Networking and community interaction
industry practitioners by using discussion boards

Frequently Asked Questions

Are there any LIVE sessions with the institute faculty in this programme?
This programme is designed to give flexible learning given time constraints of working professionals and contains high-quality pre-recorded
videos with the globally renowned faculty from ISB. No live sessions will be taken by ISB faculty.
What is the role of the Programme Leader? Are they institute faculty?
Programme Leaders are Industry Practitioners/Subject Matter Experts who help with doubt-clearing sessions, cover specific topics deeper and
share real-world examples wherever needed. They are not the faculty of the institute.
Who grades/gives inputs on the assignments and projects?
The assignments are graded either by Programme Leader or the internal grading team.
Is there a qualifying mark/grade to get the final certification in this programme?
Yes, a minimum score of 70% in all required assignments including capstone project to successfully complete the programme and receive a digital
certificate of completion.
What if I miss the assignments for a particular week? Can I attempt them later?
An assignment that is not submitted by the due date is late. Late assignments will be accepted until one week after the programme end date,
which is published on the programme homepage. Feedback will not be provided for late submissions.
Who is the faculty for the Doubt-Clearing sessions?
Doubt-clearing sessions are carried out by the Programme Leaders, as they monitor individual student progress.
Do I get Alumni status of the institute on completion of this programme?
This programme comes with ISB Online Network access, which allows you to network with other ISB Online Alumni and a host of other benefits.
However, this is not the same as the ISB Online Alumni status accorded for full time campus programmes.
What if I don’t find the programme appropriate for me after starting the sessions? Can I seek a refund?
We encourage our learners to complete the programme to fully understand the concepts and derive valuable learning outcomes. Should you still
feel the need to stop your learning journey, a refund request can be initiated before the programme commencement. However, after the
programme commences, fee becomes non-refundable.
What type of certificate will I receive?
Upon successful completion of the programme, you will receive a smart digital certificate. The smart digital certificate can be shared with friends,
family, schools, or potential employers. You can use it on your cover letter, resume, and/or display it on your LinkedIn profile. The digital
certificate will be sent approximately two weeks after the programme, once grading is complete.
How long will I have access to the learning materials?
You will have access to the online learning platform and all the videos and programme materials for 12 months following the programme start
date. Access to the learning platform is restricted to registered participants per the terms of agreement.

This Programme Summary is provided only for your convenience. You are advised to refer to the Programme Brochure for more information.
Industry Overview
As cybersecurity rises on the risk and leadership radar, ISB Online has
launched the Cybersecurity for Leaders programme integrated with AI and
Generative AI to help you safeguard your business against the escalating
frequency and sophistication of cyber attacks. This strategic choice
programme offers a pathway to a high-growth career as a cybersecurity
leader by teaching you how to become proactive and versatile in this
dynamic field.

For leaders, understanding and implementing cybersecurity is no longer


optional but a critical necessity. As organisations face an escalating threat
landscape, cybersecurity investments are on the rise. According to Gartner,
end-user spending on information security reached $183 billion worldwide
in 2024, with a compound annual growth rate (CAGR) of 11.7% from 2023 to
2028.

A survey by McKinsey & Company reveals that spending on cybersecurity


products and services is expected to grow at an annual rate of 13% up to
2025, up from 10% growth observed in the previous three to five years.

52%
OF PUBLIC ORGANISATIONS REPORT
THAT SKILLS AND RESOURCING ARE
THEIR BIGGEST CYBER RESILIENCE
CHALLENGES.

56%
OF LEADERS BELIEVE GENERATIVE AI
WILL ADVANTAGE CYBER ATTACKERS
OVER DEFENDERS IN THE NEXT TWO
YEARS.

31%
DROP IN ORGANISATIONS REPORTING A
MINIMUM CYBER RESILIENCE SINCE
2022.

SOURCE: WORLD ECONOMIC FORUM,


GLOBAL CYBERSECURITY OUTLOOK 2024
Impact of Emerging
Technologies Like AI and
Cloud on Cybersecurity
Artificial Intelligence (AI) and emerging tech skills are essential for cybersecurity
leaders. Gartner ranks Generative AI as the top force behind 2024's cybersecurity
trends, recommending collaboration with stakeholders to ensure its ethical, safe,
and secure use.

Emerging technologies can enable

Reduced response time or


Proactive threat detection
an automated response

Enhanced overall
Strategic adaptation
cybersecurity resilience

With the help of Generative AI and cloud, cybersecurity leaders can improve their
short term thinking to ward off data breaches and design strategies that stay one
step ahead of attackers.
Programme Highlights

Pre-recorded videos for Cutting-edge


self-paced learning from modules on AI
globally renowned ISB and Generative AI
Faculty

Real-world case studies Fireside chats with ISB


and business scenarios faculty and industry
expert

Essential cybersecurity Practical cybersecurity


frameworks tools and technologies

Live sessions with Capstone


Programme Leaders project

Assignments* Be a part of the


and quizzes prestigious ISB
Online Network

Notes: -

All programme content is delivered via recorded sessions. ISB faculty will not be a part of weekly live sessions or any other live interaction in this
programme. We have a curated panel of eminent programme leaders who will be conducting the weekly live doubt-clearing sessions.
The final number of quizzes, assignments and discussions will be confirmed closer to the programme start.
*Assignments are graded either by programme leaders who are available to support participants in their learning journey and/or by the Emeritus grading
team.
Programme leaders are domain experts who will clear your doubts and guide you through your learning journey.
Essential Cybersecurity
Frameworks
Information Security
Confidentiality, Integrity,
Management System
and Availability (CIA) Triad
(ISMS)

Indian Computer
Indian Laws and
Emergency Response
Regulations
Team

Developing and
Risk Components
Implementing a
Relationship Model
Cybersecurity Strategy

How to Make My Bug


Business Impact Analysis
Bounty Cost-effective? A
(BIA)
Game-theoretical Model

National Institute of National Institute of


Standards and Standards and
Technology's (NIST) Technology's (NIST) Cyber
Incident Response Supply Chain Risk
Framework Management (C-SCRM)
Real-world Case Studies and
Business Scenarios

Crisis Management

Major Security Breach Analysis

Proactive Cybersecurity Measures in Supply


Chain

IBM's Robust Cybersecurity Reponses in


Supply Chain

State Bank of India's Effective Cybersecurity


Supply Chain Solutions

JBS Food's Robust Cybersecurity Measures in


Supply Chain

Note: -

All product and company names are trademarks or registered trademarks of their respective holders. Their use does not imply any affiliation with
or endorsement by them.
Fireside Chats

Subodha Kumar Sushil Chordia


Visiting Faculty, ISB Partner Group Manager,
Professor of Statistics, Operations, Microsoft, Search & AI
and Data Science, Fox School of
Business & Management

Key trends shaping today’s cybersecurity landscape


Explore how AI and machine learning enhance threat detection
Understand Zero Trust Architecture and Advanced Threat Protection principles
Gain real-world strategies from Microsoft’s cybersecurity expertise
Learn to secure and manage remote and hybrid workforces
Discover the evolving role of cybersecurity leadership in future-ready
organisations
Learn actionable insights to stay ahead of emerging cyber threats

Note: -

The fireside chats are recorded sessions.


Explore Practical Cybersecurity
Tools and Technologies
An introduction to how widely-used databases like CVE,
CWE, and NVD can help track known vulnerabilities,
understand common software weaknesses, and explore
basic mitigation strategies.

LIWC (Linguistic Inquiry and Word Count) - A glimpse


into how tools like LIWC can support text analysis in
cybersecurity contexts by helping identify patterns in
data from reviews, social media, or fraud reports.

Explore how text-to-speech tools like Speechify can


improve accessibility and productivity, while learning on
the potential cybersecurity implications around data
privacy and misuse.

Learn how AI-generated video platforms like Synthesia


are being explored for training and communication in
cybersecurity, along with a discussion on risks like
deepfakes and ethical concerns.

Get familiar with how GitHub is used in cybersecurity


environments—as a collaboration space for secure
code development, documentation, and resource
sharing.

An introductory look at the key capabilities of the


CrowdStrike platform, including endpoint protection and
threat intelligence, and how such tools can support a
broader security strategy.

Understand how Generative AI tools such as ChatGPT


and Copilot are being applied in cybersecurity scenarios,
with examples of how they might assist in planning or
response efforts.

An overview of how Blockchain technology works and how


it can contribute to data security and integrity through its
core components—blocks, hashes, and decentralisation.

Note: - All product and company names are trademarks or registered trademarks of their respective holders. Their use does not imply any affiliation with or endorsement by them.
Programme Modules
Module 1

Introduction to Cybersecurity
Information assets
Cybersecurity risks and threats
Information Security Management System (ISMS)
Information Security Management Objectives: The CIA Triad
How information security works
Offensive and defensive strategies
ISMS standards and compliance
ISMS best practices
Building a cybersecurity culture in an organisation
Building a cybersecurity strategy
Cybersecurity trends

Module 2

Regulations and Compliance [Part 1]


India’s cybersecurity laws and regulations
The Information Technology (IT) Act, 2000
Computer Emergency Response Team (CERT-In)
Information Technology (Amendment) Act 2008
Information technology rules, 2011
Information technology rules, 2021
Essential practices for cybersecurity professionals

Module 3

Regulations and Compliance [Part 2]


National Cyber Security Policy, 2013
National Cyber Security Strategy, 2020
Digital India Act, 2023
Data protection laws in other countries
National Critical Information Infrastructure Protection Center (NCIIPC)
ISO/IEC 27001
Know Your Customer (KYC)
Regulatory framework for financial and telecom sectors in India
Risk assessment and mitigation strategies
Cybersecurity governance models
Module 4

Security Strategy and IT Infrastructure [Part 1]

Developing and implementing a cybersecurity strategy​


Writing effective security policies and procedures
Security awareness and training programmes
Budgeting for cybersecurity​

Module 5

Security Strategy and IT Infrastructure [Part 2]

Evaluating risk exposure​


Cybersecurity control and operations, identifying threats​
Ethical hacking

Module 6

Incident Response and Crisis Management

Incident Response (IR): Overview


Incident Response (IR): Process
Incident Response life cycle
The do’s and don’ts of Incident Response
Incident handling scenario – Ransomware
Incident handling scenario – Malware
Incident handling scenario – Phishing
Crisis management
Crisis communication and public relations

Module 7

Business Continuity and Disaster Recovery

Business Continuity and Disaster Recovery (BCDR) planning


Benefits of Business Continuity and Disaster Recovery (BCDR)
Activating Business Continuity and Disaster Recovery (BCDR)
Common disaster recovery teams
Disaster classification
Disaster recovery process
Elements of a disaster recovery plan
Business continuity strategies
Timing and sequence of planning activities
Business continuity in scenarios of threat
BCDR: Some common mistakes to avoid
Internal crisis management

Module 8

Artificial Intelligence in Cybersecurity [Part 1]

AI Algorithms and techniques for cybersecurity​


Machine learning for threat detection​
Deep learning for cybersecurity​

Module 9

Artificial Intelligence in Cybersecurity [Part 2]

AI for vulnerability assessment​


AI and penetration testing
AI for incident response and security automation

Module 10

Generative AI and Cybersecurity

Introduction to Generative AI
Increased risks and threats from Generative AI, innovation in cyber attacks
Evolved threat identification through Generative AI
Future of Generative AI and automation for containment and eradication

Module 11

Emerging Tools and Technologies

Understanding emerging technologies (e.g. AI, IoT) and implementing them​


Evolving with new cyber threats and digital business strategies​
Evaluating and selecting latest security tools
Module 12

Cloud Security

Cloud computing security fundamentals


Cloud deployment models and their security implications
Best practices and technology for securing cloud environments

Module 13

Globalisation and Supply Chain Security

Understanding supply chain cyber risks


Causes of cybersecurity risks in supply chain
Supply chain attacks
Inadvertent threats in supply chain
Malicious insider activity
Role of leaders in supply chain cybersecurity
Cybersecurity supply chain risk management
Examples of supply chain cybersecurity responses

Module 14

Building and Managing a Cybersecurity Team

Creating and leading a cybersecurity team​


Building and managing talent​
Evaluating performance
Delegating responsibilities and tasks
Addressing and resolving cultural issues

Module 15 and Module 16

Ethics Responsibilities and Future of Cybersecurity [Part 1 and Part 2]

Legal and ethical responsibilities of cybersecurity leaders


Evolving regulations and laws
Building long-term cyber capabilities
Emerging threats and technologies
Ransomware case studies, critical infra protection case studies
Insider threats
Zero trust architecture
Social engineering attacks
Capstone Project

In this three-part capstone project, learners will step into the role of a cybersecurity
consultant. You will be tasked with designing a comprehensive, scalable, and
future-proof cybersecurity framework tailored for a small-scale Indian business.

You’ll begin by identifying key risks, designing a cybersecurity strategy, and


ensuring regulatory compliance. As the business evolves, the framework will be
enhanced by integrating advanced components such as AI, Business Continuity
Planning, and Generative AI.

In the final phase, you’ll future-proof the system by addressing emerging


technologies, cloud security, supply chain risks, and team design. By the end of the
project, you will have developed a real-world cybersecurity blueprint aligned with
the needs of a dynamic organisation.

Over the duration of the programme, you will progressively build your project across
three key phases:

Part A - Building the foundation


Part B - Evolving the strategy
Part C - Future-proofing the framework
Programme Faculty

Giri Kumar Tayi


Visiting Faculty, ISB
Professor of Information Systems and Business
Analytics (ISBA), Massry School of Business

Professor Tayi is a prolific and award-winning academic with approximately 80


refereed journal articles, 65 conference proceedings/presentations, and numerous
book chapters spanning Information Systems (IS), Operations Management (OM),
and Operations Research (OR). As a Senior Faculty Fellow at the Center for
Technology in Government (CTG), he has secured $3.25 million in NSF funding and
co-guest-edited special issues for reputable publications. With an extensive global
presence, he has held visiting positions at institutions like Singapore Management
University and KAIST, delivering more than 80 invited presentations and contributing
as an external reviewer to faculty promotions worldwide.

Subodha Kumar
Visiting Faculty, ISB
Professor of Statistics, Operations, and Data
Science, Fox School of Business and Management

Professor Subodha Kumar is the Paul R. Anderson Distinguished Chair Professor of


Statistics, Operations, and Data Science and the Founding Director of the Center for
Business Analytics and Disruptive Technologies at Temple University’s Fox School of
Business. He has a secondary appointment in Information Systems. He also serves as
the Concentration Director for the PhD. Programme in Operations and Supply Chain
Management. Professor Kumar has been awarded a Changjiang Scholars Chair
Professorship by China’s Ministry of Education. He is also a Visiting Professor at the
Indian School of Business (ISB), and he previously served on the faculty of University
of Washington and Texas A&M University.
Programme Certificate
Upon successfully completing the programme with a minimum 70% score, you will be
awarded a certificate from ISB Online.

Note: -

All certificate images are for illustrative purposes only and may be subject to change at the discretion of ISB Online.
Who Is This
Programme For?
This programme is tailored to enhance your knowledge of essential principles and
optimal methodologies in the field of cybersecurity. It will help you gain hands-on
expertise in implementing cybersecurity measures for both immediate and future
business strategies, and it will help you engage with consumer data and take
responsibility for ensuring compliance with data privacy regulations.

1 Senior leaders who want to develop new applications and frameworks


that will need to detect, withstand and counteract intrusion

2 Aspiring cybersecurity leaders who want to lead security operations


and new initiatives in their current organisation

3 Professionals keen to gain cybersecurity skills and transition to a


cybersecurity career
Key Takeaways of the
Programme

Describe key cyber security concepts and security objectives.​

Discuss the strategy and functional implementation of


cybersecurity protocols, defensive and offensive strategies.​

Analyse the ethical considerations in cybersecurity​.

Examine cybersecurity compliance and


regulations​.

Discuss how cybersecurity impacts the value


chain of a company​.

Evaluate considerations for developing business


continuity and resilience during disruptions​.

Interpret the role of emerging trends and technologies in


cyberspace​.

Discuss key components of creating and managing


high-performing cyber teams​.
ISB Online Network Benefits
Be Recognised As An ISB Online Network Member:

Preferential pricing
10% discount on other ISB Online programmes

Access to resources
Exclusive invitations to events like masterclasses, webinars
and conferences, amongst others
ISB Newsletters with latest updates

Networking and continuous learning


Learning and networking opportunities via ISB Online Network
Group on LinkedIn
Invitation to be a speaker in alumni webinars
Learning Journey

Orientation Week
The first week is orientation week. During this week you will be
introduced to the other participants in the class from across the world
and you will learn how to use the learning management system and
other learning tools provided.

Weekly Goals
As you begin the programme, meet your
learning goals set for the week. The goals
would include completing the
assignments, which have weekly
deadlines.

Self-paced, Flexible Online Learning


Learn online via pre-recorded videos from renowned ISB
faculty in a high-impact, four-month journey with a learning
commitment of 4-6 hours/ week. Faculty will not be a part of
weekly live sessions or any other live interaction in this
programme.

Debrief Sessions
The programme features weekly live online sessions
with industry practitioners who are available to help
you clarify your doubts pertaining to the content.
Assignments are graded either by programme
leaders and/or by the Emeritus grading team.

Timely Follow up and Learning Support


The Emeritus Programme Support team will
follow up over emails and phone calls with
learners who are unable to submit their
assignments on time.
Programme Details

DURATION: 16 Weeks | Online

PROGRAMME START DATE: June 30, 2025

PROGRAMME FEE*: INR 1,39,900 + GST

Notes: -

GST(currently @ 18%) will be charged extra on these components.


*Instalment payment options available.
*Additional convenience charges will be applicable on instalment payments.
*For detailed information on instalment payments reach out to your programme advisor.
About

ISB Online delivers world-class, research-


backed business education through an
immersive digital experience, equipping learners
with essential skills to excel in today’s dynamic
workplace. As ISB expands its legacy beyond its
campuses, ISB Online bridges learning gaps by
offering flexibility, engagement, and structured
learning. Developed by the school's esteemed
faculty, our research-based curriculum
integrates byte-sized videos, interactive
assessments, and case-based social learning to
ensure knowledge retention and real-world
application. Rooted in our mission pillars—
Knowledge, Business Leadership, Community,
and Thought Leadership—ISB Online empowers
professionals with a global perspective and
insights into emerging economies, shaping
future leaders through academic excellence and
digital innovation.

ISB Online is collaborating with online education provider Emeritus to offer a portfolio of
high-impact online programmes. Working with Emeritus gives ISB Online the advantage of
broadening its access beyond their on-campus offerings in a collaborative and engaging
format that stays true to the quality of ISB Online. Emeritus’ approach to learning is built on
a cohort-based design to maximise peer-to-peer sharing and includes video lectures with
world-class faculty and hands-on project-based learning. More than 300,000 students
from over 200 countries have benefitted professionally from Emeritus’ courses
Apply for the ISB Online’s Cybersecurity for Leaders
programme here

APPLY NOW

WhatsApp an Advisor on +91 86570 38243*


*This number does not accept any calls. Please message your queries.

For registration and any other information,


please get in touch with us at [email protected]

In collaboration with

Erulearning Solutions Private Limited (a company incorporated in India) is a


subsidiary of Eruditus Learning Solutions Pvt. Ltd. (a company incorporated in
Singapore), and operates under the brand name of ‘Eruditus’ and ‘Emeritus’.

You might also like