Cyber Security and IT Security Management Program

31
2016 Medard C. Sotta MeU & GIIM CYBER SECURITY AND INFORMATION TECHNOLOGY SECURITY MANAGEMENT PROGRAM

Transcript of Cyber Security and IT Security Management Program

Page 1: Cyber Security and IT Security Management Program

2016

Medard C. Sotta

MeU & GIIM

CYBER SECURITY AND INFORMATION TECHNOLOGY

SECURITY MANAGEMENT PROGRAM

Page 2: Cyber Security and IT Security Management Program

2

Table of Contents Table of Contents ............................................................................................................................... 2

Introduction....................................................................................................................................... 4

Video Presentation.......................................................................................................................... 4

Programs ........................................................................................................................................... 5

Foundation of Cyber Security ........................................................................................................... 5

Objectives.................................................................................................................................. 5

Ethical Hacker ................................................................................................................................. 6

Topics Covered........................................................................................................................... 5

Computer Hacking Forensic Investigators ......................................................................................... 8

Topics Covered........................................................................................................................... 8

Incident Response and Disaster Recovery ......................................................................................... 9

Topics Covered........................................................................................................................... 9

Network Security Administration ................................................................................................... 10

Topics Covered......................................................................................................................... 10

Secure Programming Concepts ...................................................................................................... 12

Objectives................................................................................................................................ 12

Certification & Accreditation ............................................................................................................ 13

Trainers/Program Instructors ........................................................................................................... 14

Professor Jerry Luftman, PhD ......................................................................................................... 14

Present Position ........................................................................................................................ 14

Curriculum Vitae ....................................................................................................................... 14

Professor Christine V. Bullen, PhD .................................................................................................. 15

Present Position ........................................................................................................................ 15

Curriculum Vitae ....................................................................................................................... 15

Page 3: Cyber Security and IT Security Management Program

3

Bruce J. Rogow.............................................................................................................................. 19

Curriculum Vitae ....................................................................................................................... 19

Professor Terry Savage .................................................................................................................. 21

Curriculum Vitae ....................................................................................................................... 21

Delivery Module .............................................................................................................................. 25

Testimonials .................................................................................................................................... 26

Contacts us ...................................................................................................................................... 31

Page 4: Cyber Security and IT Security Management Program

4

INTRODUCTION

Information technology security has been among the top ten management concerns since the 1980’s.

Technologies such as computer networks, PCs, the web, and more recently SMAC (Social, Mobile,

Analytics, Cloud) along with SCADA/Internet of Things continually bring new security considerations to

organizations.

These technologies in concert with changes in regulations, especially in light of the growth of valuable

and sensitive information assets stored by organizations such as individuals’ taxes, financial assets,

medical records, job performance reviews, trade secrets, new product developments, and customer

data, demand a strong focus on security management; the protection of data/information/knowledge.

The threat of invasion by cyber criminals (e.g., governments, competitors, individuals) continues to

grow.

No one can escape cyber-attacks, and the fact that it is hard to find trusted people who are expert in this

new art of war has driven the demand for security professionals to an all -time high. Many companies

are starting to address this issue with the new understanding that constant and ongoing vigilance is the

only way to protect infrastructure and data in the long term.

The purpose of this program is to help organizations meet this increased demand for information

security professionals by preparing attendees/participants via a comprehensive, in-depth, practical set

of courses addressing the entire infrastructure (e.g., data, network, web, applications, systems), as well

as the management, organizational, and legal issues.

Video Presentations

“Why a Program in Cyber Security is Essential in Today’s Dynamic Environment” - Professor Sam S. Gill

“GIIM Cyber Security” - Professor Allen C. Johnston, PhD

Page 5: Cyber Security and IT Security Management Program

5

PROGRAMS

1. Foundations of Cyber Security

This 24 hour introduction to information security provides the foundation for understanding the

planning and implementation of policies and procedures for protecting information assets, determining

the levels of protection and response to security threats and incidents, and designing an appropriate

information security system. Candidates will gain an overview of the field of information security and

assurance, and will also learn the necessary knowledge to engage in information assurance activities and

procedures. Coverage will include inspection and protection of information assets, detection of and

reaction to threats to information assets, examination of pre- and post-incident procedures, technical

and managerial responses, and an overview of the information security planning and staffing functions.

Instructors will also introduce the role of the Chief Information Security Management Officer (CISMO).

Candidates will also master risk management, security planning, and security policy enforcement and

auditing activities. Candidates will learn about security guidelines, regulation and legal implications, and

standards that apply in information security management, as well as information confidentiality, data

integrity, and system availability. The course also presents related concepts such as privacy and business

continuity planning. While emphasis is placed on managerial and operational security controls, the

course also provides an overview of the current and emerging technical security controls applied to

access control, operating systems, applications, networks/web, cryptographic solutions, intrusion

detection systems, physical security, wireless security, VPNs, digital forensics, and related topics.

The primary objectives of the course are to:

Understand the importance of information security in business continuity

Critically analyze security threats and define appropriate technical and managerial controls for these

threats

Understand procedures for ensuring compliance with security policies and standards, establish

appropriate systems and plans for security implementation

Identify legal implications of security and standards for security management

Recognize the management, organizational, and sourcing considerations for having an effective

information security program

Describe audit and recovery approaches for coping with security breaches

Page 6: Cyber Security and IT Security Management Program

6

2. Ethical Hacker

This 40 hour course offers a comprehensive guide for ethical hacking. An ethical hacker is defined as

someone who uses the same methods as criminal attackers use to exploit vulnerabilities in a network

accessible to them. The difference is that an ethical hacker performs these “attacks” in order to

document whether a network can be breached by known vulnerabilities in order to mitigate the attack

vector they expose.

Topics covered include:

Introduction to Ethical Hacking

Footprinting and Reconnaissance

Scanning Networks

Enumeration

System Hacking

Trojans and Backdoors

Viruses and Worms

Sniffers

Social Engineering

Denial of Service

Session Hijacking

Hacking Webservers

Page 7: Cyber Security and IT Security Management Program

7

Hacking Web Applications

SQL Injection

Hacking Wireless Networks

Evading IDS, Firewalls, and Honeypots

Buffer Overflow

Cryptography

Penetration Testing

Page 8: Cyber Security and IT Security Management Program

8

3. Computer Hacking Forensic Investigators

This 40 hour course presents a detailed and methodological approach to computer forensics and

evidence analysis. This will enable candidates to understand the often complex issues associated with

investigating cybercrimes, handling of digital evidence, detection methods and proof, in a variety of

digital forensic contexts, including computers, networks and portable digital devices. Each module will

build upon the knowledge gained from previous modules. This course will introduce cutting edge

technologies and methodologies, alongside fundamental building blocks, all owing candidates to

simultaneously understand the theory and practical aspects in dealing with digital investigations.

The primary topics covered in the course are intended to prepare candidates to:

Understand the function and limitations of forensic investigations.

Understand procedures used in conducting forensic investigations.

Guide first responders towards successful data acquisition and preservation.

Describe digital forensics and relate it to an investigative process.

Explain the legal issues of preparing for and performing digital forensic analysis based on the

investigator's position and duty.

Be aware of (digital) evidence storage preparation and requirements.

Perform basic digital forensic investigations.

Demonstrate use of digital forensics tools and their underlying principles.

Size and set up a digital forensic lab.

Conduct simple binary analysis on files with unknown and possible malicious functionality.

Recognize the state of the practice and the gaps in technology, policy, and legal issues.

Page 9: Cyber Security and IT Security Management Program

9

4. Incident Response and Disaster Recovery

This 24 hour course examines detailed aspects of incident response and contingency planning consisting

of incident response planning, disaster recovery planning, and business continuity planning. Developing

and executing plans to deal with incidents in the organization is a critical function in information

security. This course focuses on the planning processes for all three areas of contingency planning,

incident response, disaster recovery and business continuity, and the execution of response to human

and non-human incidents in compliance with these policies.

Topics covered include:

An Overview of Information Security and Risk Management

Planning for Organizational Readiness

Contingency Strategies for IR/DR/BC

Principles of Incident Response and Disaster Recovery

Incident Response: Detection and Decision Making

Incident Response: Organizing and Preparing the CSIRT

Incident Response: Response Strategies

Incident Response: Recovery and Maintenance

Disaster Recovery: Preparation and Implementation

Disaster Recovery: Operation and Maintenance

Business Continuity Planning

Crises Management and International Standards in IR/DR/BC

Page 10: Cyber Security and IT Security Management Program

10

5. Network Security Administration

This 40 hour course offers a comprehensive guide for understanding information systems network

security management. It provides an introduction to the fundamentals of network security, including

compliance and operational security; threats and vulnerabilities; application, data, and host security;

access control and identity management; and cryptography. The course covers new topics in network

security as well, including psychological approaches to social engineering attacks, Web application

attacks, penetration testing, data loss prevention, cloud computing security, and application

programming development security.

Topics covered include:

Introduction to Network Security

Malware and Social Engineering Attacks

Data Breaches

Application and Networking-Based Attacks

Host, Application, and Data Security

Basic Cryptography

Advanced Cryptography

Network Security Fundamentals

Administering a Secure Network

Wireless Network Security

Mobile Device Security

Page 11: Cyber Security and IT Security Management Program

11

Access Control Fundamentals

Authentication and Account Management

Business Continuity

Risk Mitigation

Vulnerability Assessment

Legal, Ethical, and Organizational Factors

Page 12: Cyber Security and IT Security Management Program

12

6. Secure Programming Concepts

The purpose of this 30 hour course is to provide candidates with a comprehensive understanding of

what a Secure Development Process is. Participants will learn secure programming concepts and

techniques; learn how to identify key characteristics of secure code; learn how to use design patterns

for secure code; learn how to build in a secure requirement process in the software life cycle from the

beginning to the end; and learn how to write, test, and debug programs using secure programming

techniques. Topics will include design principles, code snippets, and a simple explanation of each step as

you work your way through the course.

The primary objectives of the course are to:

Identify what secure programming is and why it is needed

Work with principles associated with software engineering

Understand principles of security and quality in the industry and how to use them

Understand the Application Guide

Learn how to understand, analyze, and interpret software requirements

Design for quality using industry frameworks

Know what industry design patterns are and how to carry them out

Understand industry standard development tools

Know how to produce secure code

Sustain a formal development process

Page 13: Cyber Security and IT Security Management Program

13

CERTIFICATION

A certificate from the Global Institute for IT Management (GIIM) is granted upon successfully completion of four courses. The Foundations Course is a prerequisite (requirement) for all of the other courses in the program. But participants who after reviewing the Foundations Course description believe that the foundation course is not necessary because they have sufficient background/experience in IT Security, or have taken a similar course elsewhere (hence, they accept the risk of taking the other certificate courses without taking GIIMs Foundations course first) can omit the foundation course. But whether the Foundations Course is included or not, four courses must be taken and passed to obtain a Certificate. The Cyber Security and IT Security Management Program and certificate adhere to leading international accreditation agency (e.g., AACSB, EFMD, AMBA, NSCHBC, NBA, ABET, Middle States Association) standards and expectations (e.g., European e-Competence Framework), and can also be applied towards a Master's Degree (GIIM courses as transfer credit towards a Master's Degree).

Page 14: Cyber Security and IT Security Management Program

14

TRAINERS/PROGRAM INSTRUCTORS

Program is taught by an international team of prominent academics & executives, providing a balanced

perspective of leading professors from multiple universities and expert practitioners. These are some of

the international academicians and practitioners which provide the Cyber Security and IT Security

Management program:

Professor Jerry Luftman, PhD

Present Position

Founder, Professor, & Managing Director of the Global Institute for IT Management GIIM) Jerry Luftman’s experience combines the strengths of CIO/practitioner, consultant, and academic. His proficiency in business-IT alignment and IT trends, eighteen books, published research, consulting, mentoring, and teaching/speaking engagements exemplify Dr. Luftman’s expertise and leadership. After a distinguished twenty-two year career with IBM, he had an exemplary career for about twenty years as Professor, Founder and Associate Dean of the Stevens Institute of Technology Information Systems Programs (one of the largest in the world). Driven by the strong demand for a global executive education program focusing on managing information technology, Dr. Luftman has leveraged his experience as a CIO, IT management consultant, and leading academic, with his strong network of prominent IT practitioners and academics, to provide a valuable and innovative initiative via the Global Institute for IT Management.

Dr Luftman's project experience ranges from senior management issues through tactical implementation. Dr. Luftman most recently pioneered the vehicle for assessing the maturity of IT-business alignment, where he has a benchmark repository of over one -third of the Global 1,000 companies. He also serves on the Executive Board of several companies, associations, and publications. Dr. Luftman’s last responsibility at IBM, after being a CIO, was a key speaker at their Customer Executive Conference Center in Palisades, N.Y. While responsible for management research, he played a significant role in defining and introducing the IT Strategy and Planning, and Business Process Re -engineering practice methods for the IBM Management Consulting Group. His framework for applying the strategic alignment model is fundamental in helping clients understand, define, and scope the appropriate strategic planning approach to pursue. Dr. Luftman’s annual global IT trends research, sponsored by several CIO associations and universities, is recognized internationally as an industry barometer.

Page 15: Cyber Security and IT Security Management Program

15

Professor Christine V. Bullen, PhD

Present Position

Professor, Coordinator of Strategic Issues Course, Coordinator of IT Outsourcing concentration in MSIS, Director of Distance Learning for MSIS Howe School of Technology Management Stevens Institute of Technology Castle Point on Hudson Hoboken NJ 07030

Research Current Research: Understanding the IT outsourcing decision, measuring value in IT outsourcing, Previous Research: The impact of implementing Enterprise Resource Planning Systems; investigating pharmaceutical data management systems; investigating stereotypes about computer professionals; understanding the impact of collaborative tools which facilitate the work of teams; critical issues in competitive use of networking; effective knowledge management; valuing business processes; the impacts of information systems, including networking, computer conferencing, and advanced workstation design; strategic alignment of I/T with business directions; career path issues for I/S professionals; the use of the critical success factors methodology; and the design and implementation of distributed processing. Teaching Current: Strategic Issues in IT, IT Outsourcing Governance Previous: Strategic Planning for IT, Business Design Through IT, The Human Side of ICS, End User Computing, Decision Support Systems, Core Graduate Course in IT, Core Undergraduate Course in IT, Costs and Benefits of IT, Transnational MBA IT Course Education

Ph.D. Stevens Institute of Technology

Information Management

M.B.A 1976 MIT Sloan School Planning & Control

A.B. 1967 Barnard College Biology

Page 16: Cyber Security and IT Security Management Program

16

Professional Society Membership (Current)

AIS INFORMS SIM ACM

Non-Academic Experience

1974-75 Planning Analyst, Inforex, Inc.

1968-74 Professional Staff, Arthur D. Little, Inc.

1967-68 Assistant to the President, Brand Rating Research Corporation

1966 Officer Candidate, U.S. Navy Officer Candidate School

Academic Experience

2002 – Present Faculty, Stevens Institute of Technology, Howe School of Management

1993 – 2002 Faculty, Fordham University Graduate School of Business

1976 – 1993 Assistant Director of the MIT Sloan School Center for Information Systems Research

Career Highlights

The Howe School hosted the AMCIS 2004 conference in New York City and I served officially in the role of Program Co-Chair, however unofficially served as the general chair, webmaster and local arrangements chairs as well. This conference was a huge success and the largest ever held by AIS. While it was an enormous amount of work, it was also very satisfying to successfully work with 1200 authors and reviewers, and host almost 1500 attendees.

Received the 2001 Gladys and Henry Crown Award for Faculty Excel lence at Fordham University.

This was a highlight of my Fordham career as it was voted on by three graduating classes.

The majority of her academic career (17 years) was spent at the MIT Sloan School Center for Information Systems Research (CISR). I help to launch CISR and participated in ground-breaking

research projects that are still considered significant today.

Page 17: Cyber Security and IT Security Management Program

17

She was among the “dirty 30” faculty who launched the ICIS conferences. This conference has continued to serve as the premier research conference in our field and she is proud to have

been there to get it started.

After working at Arthur D. Little, Inc for 6 years, she became part of a client team that traveled completely around the world in 4 months conducting interviews and collecting data on the use of controlled substances in all branches of U.S. Mi litary forces. This trip took her to California, Hawaii, Thailand (on the border of Cambodia during the Viet Nam war!), Afghanistan, Turkey, Italy and Spain. It was exhilarating, exhausting, and dangerous and resulted in the most significant data ever collected in this area. As a result of this work, she was presented with the President’s award.

Languages English, French, some German Teaching Courses Taught Howe School of Technology Management MS in IS: MIS 760 Strategic Issues in IT

MIS 650 IT Outsourcing Governance

Fordham University Schools of Business Undergraduate: Core IT Course MBA: Core IT Course

Planning for IT Business Design through IT The Human Side of IT End User Computing Decision Support Systems The Costs and Benefits of IT

Transnational MBA: Core IT Course

Page 18: Cyber Security and IT Security Management Program

18

Curriculum Development Coordinated the development of a four course concentration in IT Outsourcing Coordinator for the IT Outsourcing concentration Developed IT Outsourcing Governance Coordinator for Strategic Issues in IT Teaching Honors and Awards The 2001 Gladys and Henry Crown Award for Faculty Excellence at Fordham University (Chosen by the graduating classes of 9/2000, 2/2001 and 5/2001)

Page 19: Cyber Security and IT Security Management Program

19

Bruce J. Rogow

IT Odyssey and Advisory Provocative Perspectives in Information Technology Management

Since 1992, Bruce has been an independent, private counselor for Boards, CEOs and CIOs related to

the management of information technology. He presents his perspectives in thought provoking

presentations for his clients and public groups.

His perspectives are based on over 40 years of management observation, over 120 annual face -to-

face Odyssey visits with senior executives involved with directing IT and a set of frameworks

providing insight to IT executive issues. The IT Odyssey visits keep him current as to what is

happening in the management of IT, what is working, what isn’t, how executives continually

increase yield from IT investments and are restructuring IT organizations for the future.

His most current work is focused on the expectations, challenges and opportunities faced by IT over

the next decade, the steps being taken to capitalize upon and adjust to those challenges, the

evolving capabilities required and how the relationship between the Board/CEO and IT/CIO is

changing.

Bruce’s career has allowed him to build a pre-eminent understanding of the issues, mindsets and

agendas of senior executives involved with IT management. He serves as an ICEX Principal

facilitating private exchanges on Enterprise Architecture and also Infrastructure & Operations for

executives from large-scale, global enterprises. He has produced major practitioner pieces on The IT

Organization of the Future, Enabling Wikinomics (mass collaboration) and Marketing2.0 for Don

Tapscott’s nGenera Insight research programs. He contributes proprietary columns and podcasts for

several organizations such as Gartner Executive Programs and Cognizant’s thought leadership

quarterly, Cognizanti. In the 90’s, he served as an Executive Fellow of Gartner.

Previously, he was Executive Vice President, Global Head of Research for Gartner. During his

leadership, Gartner’s Total Cost of Ownership, Magic Quadrants, Hype Cycles and Symposium

became global industry standards. Gartner became the indispensable research fi rm for over 80% of

global enterprises. From 1977 through 1987, as a Senior Managing Principal of Nolan, Norton & Co,

Bruce was instrumental in developing NNC’s ground breaking IT Management Methodologies and

Practices including such now widely accepted methodologies as Functional Quality, Technical

Quality, Life Cycle Costing, Portfolio Valuation, Maintenance Ratios, IT Governance Models, Project -

Program-Endeavor Structures, Portfolio Asset Management, IT Management Process Assessment,

and IT Financial Management. He led major management assessments in over twenty Fortune 200

firms based on Dr. Nolan’s Harvard Business School frameworks. He built and led the NNC Wall

Page 20: Cyber Security and IT Security Management Program

20

Street practice for which almost every major firm was a client. He led the NNC Executive Education

efforts and was among their most sought after and effective communicators.

He started his career at IBM in Gainesville, FL in sales. Bruce then spent five years in IBM’s

Poughkeepsie Advanced Technical Training group pioneering what became known as systems

management. He was also the originator, curriculum developer and lead instructor of their IT

Complex Systems Management course that introduced systems management principles to both

customer executives and IBM field personnel.

He holds a Bachelor of Civil Engineering from the University of Florida and lives in Marblehead, MA.

He serves on the University of Florida Engineering College Dean’s Advisory Board. His wife, Winnie,

a retired Nolan, Norton & Co/KPMG Partner was the program manager for the work that became

the Balanced Scorecard by Norton & Kaplan. His son Mark was the Minor League Medical

Coordinator for the New York Mets and the Assistant Trainer of the Pittsburgh Pirates. Mark is now

Sports Medicine Program Manager with the US Naval Special Warfare in Coronado, CA. His

daughter Michelle is a Registered Professional Engineer serving as an Emergency Response On -Site

Coordinator with the EPA based from San Francisco. His other son, Geoff is News Editor for the

Markets and Finance section of The Wall Street Journal. He was formerly news editor for the WSJ

FX/Trader, a markets reporter for Dow Jones in New York City, the economics and fixed income

reporter in Sydney and had a daily column in the WSJ. Bruce and Geoff consider their respective

work to be confidential and they do not share any discussion of their respective work.

Page 21: Cyber Security and IT Security Management Program

21

Professor Terry Savage Summary of Qualifications Seven years as a graduate professor engaged in teaching, course creation, advising, academic business process improvement, and marketing. In dealing with all aspects of an academic environment I possess the ability to ensure that the roles of educator and administrator are performed at the highest level. My successful career as a senior executive and consultant adds to my ability to interject real life experiences into the courses I teach.

2004 – Present Stevens Institute of Technology, Haboken, New Jersey

2006 – 11 Participating Adjunct Professor Director of Marketing - Financial Services

2006 – 11 Student Advisor

Lead member of the team responsible for creating, maintaining, and delivering the Information Systems Masters Capstone Course. The objective of the course is to prepare experienced and entry level Information Technology professionals for their transition into senior management positions. Course content focuses on the skills and tools required to develop and implement strategic business decisions. Assignments are based on the actual demands of the individual students company (or case). Students are required to work with their business counterparts during the course. Co-authored and developed the schools concentration in Management Consulting. Serve as the Marketing Director and Student Advisor for the Financial Services industry. Teaching and marketing responsibilities are domestic, international and web based. This program is one of the largest and most successful in the world. Curriculum Competencies The following is based on my academic, educational, and professional experience. The areas listed below relate to concentrations; the individual courses associated within these concentrations would follow the institutions AACSB Syllabi. Curriculums can be taught on an undergraduate, graduate, or certificate level. All can be taught as executive or seminar programs. * Organizational Behavior & Theory * Business Practices and Strategies * Elements of Consulting * Alignment Strategy between IT & Business * Supply Chain Management * Distribution & Logistics * Procurement and Vendor Management * Concepts of Industrial Engineering

Page 22: Cyber Security and IT Security Management Program

22

* Strategic Alignment – Methods & Metrics * Entrepreneurship * Materials management * Process Engineering * Labor / Management Issues * Efficiency and Incentives Additional Selected Accomplishments:

(i) As student advisor he advised, reviewed, and approved course study plans. Worked with academic staff and students to facilitate resolution of issues (e.g., student, course, process).

(ii) Co-authored and developed the schools Management Consulting Track.

(iii) Teach courses on campus, at cohort locations, over the web, national and

internationally.

(iv) Review academic research for publication.

(v) Interface with internal and external executives to enhance operations and processes in and outside the academic environment by creating new and unique opportunities

for growth and improvement.

(vi) As a Director of Marketing developed, instituted, and took part in the first live web Information Sessions for prospective students. Sessions were interactive and can still be accessed externally for rebroadcast. Created print and e-mail campaigns.

Marketed on campus, via web and at offsite locations.

Education /Academic Accomplishments

M.B.A – Major: Management, Thesis: Marketing Fairleigh Dickenson University

B.S – Industrial Engineering Newark College of Engineering (New Jersey Institute of Technology)

C.E.U – Operations Research Wharton College

Management Consulting Track Stevens Institute of Technology Curriculum Development

Reviewer Communications of the Association for Information Systems.

“Outstanding Adjunct Professor” 2008 Stevens

Page 23: Cyber Security and IT Security Management Program

23

Professional Experience 1983- Present Terrence Savage LLC, Boca Raton, Florida, Fort Lee, New Jersey Principal A full service business, management, and information technology consulting firm retained by private and public companies, international institutions, and government agencies to perform studies and undertake engagements domestically and abroad. A multi-disciplined organization I am capable of working across all levels of management for the successful implementation of projects requiring alignment between business and technology. Services * Business Continuity * Disaster Recovery * Organization * Policy and Procedures * Strategic Planning * Technology Assessment * Strategic Alignment * Executive Seminars * Vendor Management * Risk Assessment * Audit Implementation * Process Engineering * Supply Chain Management * Marketing * Warehouse Management Selected Accomplishments:

(i) Using Supply Chain Management and Critical Inventory Scheduling enabled a third party distribution center to create a virtual warehouse where goods could be scheduled in and out of locations in advance of physical movement. Overall effect was to reduce space requirements by 15%. Additional benefit was the ability to move stock to forward picking locations at time of initial receipt of inventory. Continuous Benchmarking was implemented to gauge accomplishments.

(ii) Oversaw the strategic business and technology tasks of introducing a non-American bank into the US. Project was completed as defined, within budget and on time. The follow-up assignment to upgrade and integrate the core business and IT systems of the two entities was also accomplished in a successful manner and signed off on by the Board of Directors. Lead consultant efforts for two FDIC audits.

Page 24: Cyber Security and IT Security Management Program

24

(iii) Worked under a two year contract for the World Bank to establish an export

development program for manufacturers in Jamaica. Gave manufacturing and distribution support as requested, while coordinating all program activities through the Bank of Jamaica. Program accomplished its goal of providing funding and management expertise for export development.

(iv) Developed metrics and analytical tools for various financial and non-financial

concerns to access the various risks associated with specific business plans. These methodologies focused on both the technical and physical analysis of business and IT aligned strategies.

1970-1983 Additional Professional Experience Starting in the manufacturing sector as an Industrial Engineer I demonstrated the professional and managerial skills to achieve success in a variety of manufacturing and service industries. Positions included Chief Industrial Engineer, Plant Manager and General Manager. Responsibilities included strategic planning, budgets, project implementation, facilities management, purchasing, outsourcing, quality control, supply chain management, and human resources.

Jackson Modern Art (1981-1983) - General Manager: A privately held firm employing over 300 salaried and hourly personnel.

Celebrity (1979 - 1981) - Plant Manager: Managed a manufacturing and distribution force of

over 100 employees located in multiple locations.

Aberdeen Manufacturing (1976 - 1979) Assistant to Sr. Executive Vice President: Directed projects across multiple divisions. Initiatives included; Manufacturing, Vendor Management, Distribution, and Construction, Budgeting.

Jaclyn, Inc. (1970 - 1976) Chief Industrial Engineer: Responsible for the layout, process flow,

costing, labor budgets and incentive payroll of over 500 employees at three locations.

Page 25: Cyber Security and IT Security Management Program

25

DELIVERY MODULE

The delivery model of this program is via asynchronous learning, which is leveraging the use of

internet to provide the program via the web in the online distance self -paced learning model.

The online enrollment portal link for these programs is here.

Optionally, we can also provide synchronous learning or Face-to-face Classroom Learning, though

that comes also with the changing in our pricing considering for example in order to have a

successfully face-to-face classroom learning overheads costs for venue, travelling, hotel etc. are

inevitable contrary to the asynchronous learning.

Page 26: Cyber Security and IT Security Management Program

26

TESTIMONIALS

Comments from our previous candidates

"The classes prepared me for significantly increased responsibilities in my company. Within 2 years of

completing the courses I was responsible for strategically critical areas of our global technical

infrastructure."

- John Murphy, Director Deutsche Bank

"Working in a professional services organization, the program gave me skills that were applicable from

day one. Whether it was dealing with strategic programs, project management, financial management,

or technology issues, the classes were all relevant and helped accelerate my career progression."

-Tony Politano, Senior Director, Oracle Corporation and author

"My new found Project Management, Financial Control, and Information Technology Management skills

enable me to run strategic initiatives more effectively."

- Stanley Kules, Vice President, the Bank of New York Mellon Corporation

Page 27: Cyber Security and IT Security Management Program

27

"Upon completing the classes I was promoted to Director of the Information Technology Support

Directorate where I managed 5 divisions staffed with 142 IT professionals providing the full suite of IT

applications and support services and was responsible for $100M+ budget."

- John J. Tugman, Vice President, EPS Network Solutions

"The courses and leadership under Jerry allowed me to transition from the corporate world into the

academic world. His IBM experience and connections with IT leaders from around the world were

invaluable in developing a research stream that not only resulted in my Ph.D. dissertation, but several co-

authored articles over the years. Luftman's guidance and mentoring have allowed me to pursue my goal

of a career in academia and still maintain a consulting practice on the side"

- Dr. Raymond Papp, Associate Professor, The University of Tampa

"With the knowledge, confidence, and support that I received from the courses I was able to grow my

company by seeking out strategic partnerships. This allowed me to participate in an IPO and created an

entirely new career path that would not have been possible before the program."

- Ken Harney, Director, the Burgiss Group

Page 28: Cyber Security and IT Security Management Program

28

"Having the opportunity to work in several very large and very different Fortune 500 companies as an IT

professional (and as a women), I can flat out tell you that I did not have the right skills in place early in

my career to help me meet my career objectives. My Information Systems Undergraduate Degree did not

prepare me for what I needed to know even 10 years into my job. I was stalling out as a First Line

Manager and was struggling as a woman in a man's field as well. I found what I was missing in taking

my career to the next level with the classes. It ingrained in me the need to understand the business and

to personally take hold of my own career with what I learned and experienced, and to get to know as

many people by leveraging those skills, and managing my relationship better, which indeed led me to

find the right mentors to guide me on my path. I can say with all sincerity, I would not be where I am

today without programs like GIIM."

- Catherine M. White, Technology Director, Risk Technology at JPMorgan Chase

"As a senior management consultant, former CIO and academic my course experience has exceeded my

expectations for its broad coverage of subject matter essential to the effective management of IT

organizations in the 21st century. Graduates of GIIM are exposed to real-world problems in IT strategy

and organization management that must be addressed through the application of a wide variety of

analysis frameworks, business planning techniques and core technology courses that will serve them well

in their current and future workplaces. Graduates are prepared to face real-world business and IT

challenges to a degree I find in few other academic programs.

Jerry Luftman, as founder and Executive Director of GIIM brings world-class depth of experience as a

senior practitioner at IBM, senior management consultant and academic to the program and breathes

life into the types of problems and exercises posed to students. His deep practical experience working at

CxO levels in many different industries and his ground-breaking research in the area of strategic

Page 29: Cyber Security and IT Security Management Program

29

alignment of business and IT enables Dr. Luftman to bring current insights to the classroom environment

to the benefit of his students."

- Elby Nash, Senior Management Consultant Cognizant

"Today’s market is ultra-competitive. You need an edge if you want to stand out. Completing the courses

in the program has given me that distinction. The IS classes better prepared me with a well-rounded

focused education experience in information technology management."

- Donald E. Brown, Executive, Prudential

“Jerry is a renowned expert in information technology and business a lignment and I've benefited

tremendously by his counsel, leadership, insights and applied experience in this key area. Dr. Luftman's

experience combines the strengths of practitioner, consultant, and academic. His framework for

assessing IT-business alignment maturity is considered key in helping companies around the world

understand, define, and scope an appropriate strategic planning direction that leverages Information

Technology. Dr. Luftman continues to publish leading research and his GIIM program is making a

significant contribution to individuals and companies around the globe. He is an invaluable reference in

my role as an IT executive.”

- Ken Denno, Sales Director, Oracle Corporation

Page 30: Cyber Security and IT Security Management Program

30

"The courses have provided me with the concepts, methods, and tools to use in my career. The program

gave me a greater understanding of the Strategic Alignment between Information Technology and

Business. The focus on strategy, Business Process Management, and Technology Fundamentals gave me

the ideal landscape to further my career. The mix of classes provided me with a unique mixture of

Business Acumen with Innovation through use of Technology. My experience with the faculty was

excellent. I would recommend the program to Executives, Managers, and those interested in furthering

their understanding of strategy, information technology, and business. The faculty in his new

independent initiative are top notch in the industry."

- Chris Colla, Director of Business Process Management

Logistics and Supply Chain, Sharp Electronics Corporation

Page 31: Cyber Security and IT Security Management Program

31

CONTACT US

Emails

info@medarduniversity [email protected]

Websites

www.globaliim.com

www.medarduniversity.org

Mobile +255769986829 +255684643402