1. Overview
  2. Digital Threats & Cyber Crime
  3. Securing Information in the Digital Economy Age:
    1. The Surveillance Economy
    2. Big Data, Big Risk
    3. Connected, Dependent and Vulnerable
    4. You are the product, not the customer
  4. Ransomware
  5. Penetration Testing
  6. Information Security Risk Managment & Cost of Risk
  7. Computer Forensics

Each Topic is covered in a two-hour meeting for a total of 14 hours