Cybersecurity
for Leaders
STARTS ON: 30 JUNE 2025
16 WEEKS + ONLINE
ISB ONLINE NETWORK
LEARN FROM
#1 B-SCHOOL
IN INDIA
SOURCE: FT GLOBAL MBA RANKING 2025
Integrated with
Generative AI
Integrated with
Generative AI
Programme Overview
The global information security market is projected to grow from $183 billion in
2024 to $292 billion by 2028, with a compound annual growth rate (CAGR) of 11.7%
(Gartner). This growth is driven by increasing cyber threats which continue to disrupt
critical services and infrastructure globally, the demand for skilled leaders capable of
detecting, mitigating and preventing cyber attacks is skyrocketing.
Recognising cybersecurity as a top priority for risk management and leadership,
ISB Online has launched the Cybersecurity for Leaders programme integrated with AI
and Generative AI to help you safeguard your business against the escalating
frequency and sophistication of cyber attacks. This strategically curated programme
offers a pathway to a high-growth career as a cybersecurity leader by teaching you
how to become proactive and versatile in this dynamic field.
This programme addresses this demand surge by offering you a comprehensive
cybersecurity curriculum that includes cybersecurity regulation and compliance as well
as the use of Generative AI and AI to improve decision-making, build robust teams and
become a fully equipped cybersecurity leader.
A Forrester survey revealed
that 78% of organisations
experienced at least one
breach in the past 12
months, up from 63% two
years prior. Notably, 22%
reported being breached six
to ten times within the same
period.
Programme Summary
Institute Name Programme Duration Cost Learning Mode Weekly Effort
ISB Online 16 Weeks INR 1,39,900 + GST Online 5-6 Hours a Week
Faculty Guest Faculty/ Programme Leader Eligibility Certificate
ISB Faculty Industry Experts Subject Matter Any Graduate/ Upon Successful Completion of
Senior Industry Experts/Mid-industry Diploma Holder the Programme, Participants Will Be
Practitioners Practitioners Awarded a Verified Digital
Certificate From ISB Online
Learning Experience
Pre-recorded videos with ISB Faculty - High-quality videos - On-demand learning -
Learn at your own pace, around your Great learning experience, even Re-watch any lesson/concept
busy schedule while on the move for deeper understanding
World-class faculty - Cohort-based learning -
Learn from the best faculty and Networking and community interaction
industry practitioners by using discussion boards
Frequently Asked Questions
Are there any LIVE sessions with the institute faculty in this programme?
This programme is designed to give flexible learning given time constraints of working professionals and contains high-quality pre-recorded
videos with the globally renowned faculty from ISB. No live sessions will be taken by ISB faculty.
What is the role of the Programme Leader? Are they institute faculty?
Programme Leaders are Industry Practitioners/Subject Matter Experts who help with doubt-clearing sessions, cover specific topics deeper and
share real-world examples wherever needed. They are not the faculty of the institute.
Who grades/gives inputs on the assignments and projects?
The assignments are graded either by Programme Leader or the internal grading team.
Is there a qualifying mark/grade to get the final certification in this programme?
Yes, a minimum score of 70% in all required assignments including capstone project to successfully complete the programme and receive a digital
certificate of completion.
What if I miss the assignments for a particular week? Can I attempt them later?
An assignment that is not submitted by the due date is late. Late assignments will be accepted until one week after the programme end date,
which is published on the programme homepage. Feedback will not be provided for late submissions.
Who is the faculty for the Doubt-Clearing sessions?
Doubt-clearing sessions are carried out by the Programme Leaders, as they monitor individual student progress.
Do I get Alumni status of the institute on completion of this programme?
This programme comes with ISB Online Network access, which allows you to network with other ISB Online Alumni and a host of other benefits.
However, this is not the same as the ISB Online Alumni status accorded for full time campus programmes.
What if I don’t find the programme appropriate for me after starting the sessions? Can I seek a refund?
We encourage our learners to complete the programme to fully understand the concepts and derive valuable learning outcomes. Should you still
feel the need to stop your learning journey, a refund request can be initiated before the programme commencement. However, after the
programme commences, fee becomes non-refundable.
What type of certificate will I receive?
Upon successful completion of the programme, you will receive a smart digital certificate. The smart digital certificate can be shared with friends,
family, schools, or potential employers. You can use it on your cover letter, resume, and/or display it on your LinkedIn profile. The digital
certificate will be sent approximately two weeks after the programme, once grading is complete.
How long will I have access to the learning materials?
You will have access to the online learning platform and all the videos and programme materials for 12 months following the programme start
date. Access to the learning platform is restricted to registered participants per the terms of agreement.
This Programme Summary is provided only for your convenience. You are advised to refer to the Programme Brochure for more information.
Industry Overview
As cybersecurity rises on the risk and leadership radar, ISB Online has
launched the Cybersecurity for Leaders programme integrated with AI and
Generative AI to help you safeguard your business against the escalating
frequency and sophistication of cyber attacks. This strategic choice
programme offers a pathway to a high-growth career as a cybersecurity
leader by teaching you how to become proactive and versatile in this
dynamic field.
For leaders, understanding and implementing cybersecurity is no longer
optional but a critical necessity. As organisations face an escalating threat
landscape, cybersecurity investments are on the rise. According to Gartner,
end-user spending on information security reached $183 billion worldwide
in 2024, with a compound annual growth rate (CAGR) of 11.7% from 2023 to
2028.
A survey by McKinsey & Company reveals that spending on cybersecurity
products and services is expected to grow at an annual rate of 13% up to
2025, up from 10% growth observed in the previous three to five years.
52%
OF PUBLIC ORGANISATIONS REPORT
THAT SKILLS AND RESOURCING ARE
THEIR BIGGEST CYBER RESILIENCE
CHALLENGES.
56%
OF LEADERS BELIEVE GENERATIVE AI
WILL ADVANTAGE CYBER ATTACKERS
OVER DEFENDERS IN THE NEXT TWO
YEARS.
31%
DROP IN ORGANISATIONS REPORTING A
MINIMUM CYBER RESILIENCE SINCE
2022.
SOURCE: WORLD ECONOMIC FORUM,
GLOBAL CYBERSECURITY OUTLOOK 2024
Impact of Emerging
Technologies Like AI and
Cloud on Cybersecurity
Artificial Intelligence (AI) and emerging tech skills are essential for cybersecurity
leaders. Gartner ranks Generative AI as the top force behind 2024's cybersecurity
trends, recommending collaboration with stakeholders to ensure its ethical, safe,
and secure use.
Emerging technologies can enable
Reduced response time or
Proactive threat detection
an automated response
Enhanced overall
Strategic adaptation
cybersecurity resilience
With the help of Generative AI and cloud, cybersecurity leaders can improve their
short term thinking to ward off data breaches and design strategies that stay one
step ahead of attackers.
Programme Highlights
Pre-recorded videos for Cutting-edge
self-paced learning from modules on AI
globally renowned ISB and Generative AI
Faculty
Real-world case studies Fireside chats with ISB
and business scenarios faculty and industry
expert
Essential cybersecurity Practical cybersecurity
frameworks tools and technologies
Live sessions with Capstone
Programme Leaders project
Assignments* Be a part of the
and quizzes prestigious ISB
Online Network
Notes: -
All programme content is delivered via recorded sessions. ISB faculty will not be a part of weekly live sessions or any other live interaction in this
programme. We have a curated panel of eminent programme leaders who will be conducting the weekly live doubt-clearing sessions.
The final number of quizzes, assignments and discussions will be confirmed closer to the programme start.
*Assignments are graded either by programme leaders who are available to support participants in their learning journey and/or by the Emeritus grading
team.
Programme leaders are domain experts who will clear your doubts and guide you through your learning journey.
Essential Cybersecurity
Frameworks
Information Security
Confidentiality, Integrity,
Management System
and Availability (CIA) Triad
(ISMS)
Indian Computer
Indian Laws and
Emergency Response
Regulations
Team
Developing and
Risk Components
Implementing a
Relationship Model
Cybersecurity Strategy
How to Make My Bug
Business Impact Analysis
Bounty Cost-effective? A
(BIA)
Game-theoretical Model
National Institute of National Institute of
Standards and Standards and
Technology's (NIST) Technology's (NIST) Cyber
Incident Response Supply Chain Risk
Framework Management (C-SCRM)
Real-world Case Studies and
Business Scenarios
Crisis Management
Major Security Breach Analysis
Proactive Cybersecurity Measures in Supply
Chain
IBM's Robust Cybersecurity Reponses in
Supply Chain
State Bank of India's Effective Cybersecurity
Supply Chain Solutions
JBS Food's Robust Cybersecurity Measures in
Supply Chain
Note: -
All product and company names are trademarks or registered trademarks of their respective holders. Their use does not imply any affiliation with
or endorsement by them.
Fireside Chats
Subodha Kumar Sushil Chordia
Visiting Faculty, ISB Partner Group Manager,
Professor of Statistics, Operations, Microsoft, Search & AI
and Data Science, Fox School of
Business & Management
Key trends shaping today’s cybersecurity landscape
Explore how AI and machine learning enhance threat detection
Understand Zero Trust Architecture and Advanced Threat Protection principles
Gain real-world strategies from Microsoft’s cybersecurity expertise
Learn to secure and manage remote and hybrid workforces
Discover the evolving role of cybersecurity leadership in future-ready
organisations
Learn actionable insights to stay ahead of emerging cyber threats
Note: -
The fireside chats are recorded sessions.
Explore Practical Cybersecurity
Tools and Technologies
An introduction to how widely-used databases like CVE,
CWE, and NVD can help track known vulnerabilities,
understand common software weaknesses, and explore
basic mitigation strategies.
LIWC (Linguistic Inquiry and Word Count) - A glimpse
into how tools like LIWC can support text analysis in
cybersecurity contexts by helping identify patterns in
data from reviews, social media, or fraud reports.
Explore how text-to-speech tools like Speechify can
improve accessibility and productivity, while learning on
the potential cybersecurity implications around data
privacy and misuse.
Learn how AI-generated video platforms like Synthesia
are being explored for training and communication in
cybersecurity, along with a discussion on risks like
deepfakes and ethical concerns.
Get familiar with how GitHub is used in cybersecurity
environments—as a collaboration space for secure
code development, documentation, and resource
sharing.
An introductory look at the key capabilities of the
CrowdStrike platform, including endpoint protection and
threat intelligence, and how such tools can support a
broader security strategy.
Understand how Generative AI tools such as ChatGPT
and Copilot are being applied in cybersecurity scenarios,
with examples of how they might assist in planning or
response efforts.
An overview of how Blockchain technology works and how
it can contribute to data security and integrity through its
core components—blocks, hashes, and decentralisation.
Note: - All product and company names are trademarks or registered trademarks of their respective holders. Their use does not imply any affiliation with or endorsement by them.
Programme Modules
Module 1
Introduction to Cybersecurity
Information assets
Cybersecurity risks and threats
Information Security Management System (ISMS)
Information Security Management Objectives: The CIA Triad
How information security works
Offensive and defensive strategies
ISMS standards and compliance
ISMS best practices
Building a cybersecurity culture in an organisation
Building a cybersecurity strategy
Cybersecurity trends
Module 2
Regulations and Compliance [Part 1]
India’s cybersecurity laws and regulations
The Information Technology (IT) Act, 2000
Computer Emergency Response Team (CERT-In)
Information Technology (Amendment) Act 2008
Information technology rules, 2011
Information technology rules, 2021
Essential practices for cybersecurity professionals
Module 3
Regulations and Compliance [Part 2]
National Cyber Security Policy, 2013
National Cyber Security Strategy, 2020
Digital India Act, 2023
Data protection laws in other countries
National Critical Information Infrastructure Protection Center (NCIIPC)
ISO/IEC 27001
Know Your Customer (KYC)
Regulatory framework for financial and telecom sectors in India
Risk assessment and mitigation strategies
Cybersecurity governance models
Module 4
Security Strategy and IT Infrastructure [Part 1]
Developing and implementing a cybersecurity strategy
Writing effective security policies and procedures
Security awareness and training programmes
Budgeting for cybersecurity
Module 5
Security Strategy and IT Infrastructure [Part 2]
Evaluating risk exposure
Cybersecurity control and operations, identifying threats
Ethical hacking
Module 6
Incident Response and Crisis Management
Incident Response (IR): Overview
Incident Response (IR): Process
Incident Response life cycle
The do’s and don’ts of Incident Response
Incident handling scenario – Ransomware
Incident handling scenario – Malware
Incident handling scenario – Phishing
Crisis management
Crisis communication and public relations
Module 7
Business Continuity and Disaster Recovery
Business Continuity and Disaster Recovery (BCDR) planning
Benefits of Business Continuity and Disaster Recovery (BCDR)
Activating Business Continuity and Disaster Recovery (BCDR)
Common disaster recovery teams
Disaster classification
Disaster recovery process
Elements of a disaster recovery plan
Business continuity strategies
Timing and sequence of planning activities
Business continuity in scenarios of threat
BCDR: Some common mistakes to avoid
Internal crisis management
Module 8
Artificial Intelligence in Cybersecurity [Part 1]
AI Algorithms and techniques for cybersecurity
Machine learning for threat detection
Deep learning for cybersecurity
Module 9
Artificial Intelligence in Cybersecurity [Part 2]
AI for vulnerability assessment
AI and penetration testing
AI for incident response and security automation
Module 10
Generative AI and Cybersecurity
Introduction to Generative AI
Increased risks and threats from Generative AI, innovation in cyber attacks
Evolved threat identification through Generative AI
Future of Generative AI and automation for containment and eradication
Module 11
Emerging Tools and Technologies
Understanding emerging technologies (e.g. AI, IoT) and implementing them
Evolving with new cyber threats and digital business strategies
Evaluating and selecting latest security tools
Module 12
Cloud Security
Cloud computing security fundamentals
Cloud deployment models and their security implications
Best practices and technology for securing cloud environments
Module 13
Globalisation and Supply Chain Security
Understanding supply chain cyber risks
Causes of cybersecurity risks in supply chain
Supply chain attacks
Inadvertent threats in supply chain
Malicious insider activity
Role of leaders in supply chain cybersecurity
Cybersecurity supply chain risk management
Examples of supply chain cybersecurity responses
Module 14
Building and Managing a Cybersecurity Team
Creating and leading a cybersecurity team
Building and managing talent
Evaluating performance
Delegating responsibilities and tasks
Addressing and resolving cultural issues
Module 15 and Module 16
Ethics Responsibilities and Future of Cybersecurity [Part 1 and Part 2]
Legal and ethical responsibilities of cybersecurity leaders
Evolving regulations and laws
Building long-term cyber capabilities
Emerging threats and technologies
Ransomware case studies, critical infra protection case studies
Insider threats
Zero trust architecture
Social engineering attacks
Capstone Project
In this three-part capstone project, learners will step into the role of a cybersecurity
consultant. You will be tasked with designing a comprehensive, scalable, and
future-proof cybersecurity framework tailored for a small-scale Indian business.
You’ll begin by identifying key risks, designing a cybersecurity strategy, and
ensuring regulatory compliance. As the business evolves, the framework will be
enhanced by integrating advanced components such as AI, Business Continuity
Planning, and Generative AI.
In the final phase, you’ll future-proof the system by addressing emerging
technologies, cloud security, supply chain risks, and team design. By the end of the
project, you will have developed a real-world cybersecurity blueprint aligned with
the needs of a dynamic organisation.
Over the duration of the programme, you will progressively build your project across
three key phases:
Part A - Building the foundation
Part B - Evolving the strategy
Part C - Future-proofing the framework
Programme Faculty
Giri Kumar Tayi
Visiting Faculty, ISB
Professor of Information Systems and Business
Analytics (ISBA), Massry School of Business
Professor Tayi is a prolific and award-winning academic with approximately 80
refereed journal articles, 65 conference proceedings/presentations, and numerous
book chapters spanning Information Systems (IS), Operations Management (OM),
and Operations Research (OR). As a Senior Faculty Fellow at the Center for
Technology in Government (CTG), he has secured $3.25 million in NSF funding and
co-guest-edited special issues for reputable publications. With an extensive global
presence, he has held visiting positions at institutions like Singapore Management
University and KAIST, delivering more than 80 invited presentations and contributing
as an external reviewer to faculty promotions worldwide.
Subodha Kumar
Visiting Faculty, ISB
Professor of Statistics, Operations, and Data
Science, Fox School of Business and Management
Professor Subodha Kumar is the Paul R. Anderson Distinguished Chair Professor of
Statistics, Operations, and Data Science and the Founding Director of the Center for
Business Analytics and Disruptive Technologies at Temple University’s Fox School of
Business. He has a secondary appointment in Information Systems. He also serves as
the Concentration Director for the PhD. Programme in Operations and Supply Chain
Management. Professor Kumar has been awarded a Changjiang Scholars Chair
Professorship by China’s Ministry of Education. He is also a Visiting Professor at the
Indian School of Business (ISB), and he previously served on the faculty of University
of Washington and Texas A&M University.
Programme Certificate
Upon successfully completing the programme with a minimum 70% score, you will be
awarded a certificate from ISB Online.
Note: -
All certificate images are for illustrative purposes only and may be subject to change at the discretion of ISB Online.
Who Is This
Programme For?
This programme is tailored to enhance your knowledge of essential principles and
optimal methodologies in the field of cybersecurity. It will help you gain hands-on
expertise in implementing cybersecurity measures for both immediate and future
business strategies, and it will help you engage with consumer data and take
responsibility for ensuring compliance with data privacy regulations.
1 Senior leaders who want to develop new applications and frameworks
that will need to detect, withstand and counteract intrusion
2 Aspiring cybersecurity leaders who want to lead security operations
and new initiatives in their current organisation
3 Professionals keen to gain cybersecurity skills and transition to a
cybersecurity career
Key Takeaways of the
Programme
Describe key cyber security concepts and security objectives.
Discuss the strategy and functional implementation of
cybersecurity protocols, defensive and offensive strategies.
Analyse the ethical considerations in cybersecurity.
Examine cybersecurity compliance and
regulations.
Discuss how cybersecurity impacts the value
chain of a company.
Evaluate considerations for developing business
continuity and resilience during disruptions.
Interpret the role of emerging trends and technologies in
cyberspace.
Discuss key components of creating and managing
high-performing cyber teams.
ISB Online Network Benefits
Be Recognised As An ISB Online Network Member:
Preferential pricing
10% discount on other ISB Online programmes
Access to resources
Exclusive invitations to events like masterclasses, webinars
and conferences, amongst others
ISB Newsletters with latest updates
Networking and continuous learning
Learning and networking opportunities via ISB Online Network
Group on LinkedIn
Invitation to be a speaker in alumni webinars
Learning Journey
Orientation Week
The first week is orientation week. During this week you will be
introduced to the other participants in the class from across the world
and you will learn how to use the learning management system and
other learning tools provided.
Weekly Goals
As you begin the programme, meet your
learning goals set for the week. The goals
would include completing the
assignments, which have weekly
deadlines.
Self-paced, Flexible Online Learning
Learn online via pre-recorded videos from renowned ISB
faculty in a high-impact, four-month journey with a learning
commitment of 4-6 hours/ week. Faculty will not be a part of
weekly live sessions or any other live interaction in this
programme.
Debrief Sessions
The programme features weekly live online sessions
with industry practitioners who are available to help
you clarify your doubts pertaining to the content.
Assignments are graded either by programme
leaders and/or by the Emeritus grading team.
Timely Follow up and Learning Support
The Emeritus Programme Support team will
follow up over emails and phone calls with
learners who are unable to submit their
assignments on time.
Programme Details
DURATION: 16 Weeks | Online
PROGRAMME START DATE: June 30, 2025
PROGRAMME FEE*: INR 1,39,900 + GST
Notes: -
GST(currently @ 18%) will be charged extra on these components.
*Instalment payment options available.
*Additional convenience charges will be applicable on instalment payments.
*For detailed information on instalment payments reach out to your programme advisor.
About
ISB Online delivers world-class, research-
backed business education through an
immersive digital experience, equipping learners
with essential skills to excel in today’s dynamic
workplace. As ISB expands its legacy beyond its
campuses, ISB Online bridges learning gaps by
offering flexibility, engagement, and structured
learning. Developed by the school's esteemed
faculty, our research-based curriculum
integrates byte-sized videos, interactive
assessments, and case-based social learning to
ensure knowledge retention and real-world
application. Rooted in our mission pillars—
Knowledge, Business Leadership, Community,
and Thought Leadership—ISB Online empowers
professionals with a global perspective and
insights into emerging economies, shaping
future leaders through academic excellence and
digital innovation.
ISB Online is collaborating with online education provider Emeritus to offer a portfolio of
high-impact online programmes. Working with Emeritus gives ISB Online the advantage of
broadening its access beyond their on-campus offerings in a collaborative and engaging
format that stays true to the quality of ISB Online. Emeritus’ approach to learning is built on
a cohort-based design to maximise peer-to-peer sharing and includes video lectures with
world-class faculty and hands-on project-based learning. More than 300,000 students
from over 200 countries have benefitted professionally from Emeritus’ courses
Apply for the ISB Online’s Cybersecurity for Leaders
programme here
APPLY NOW
WhatsApp an Advisor on +91 86570 38243*
*This number does not accept any calls. Please message your queries.
For registration and any other information,
please get in touch with us at
[email protected] In collaboration with
Erulearning Solutions Private Limited (a company incorporated in India) is a
subsidiary of Eruditus Learning Solutions Pvt. Ltd. (a company incorporated in
Singapore), and operates under the brand name of ‘Eruditus’ and ‘Emeritus’.