Cybersecurity Management

Cybersecurity

Defend. Protect. Secure.
Cyber threats and attacks are happening daily. Defend and protect against cyber threats with a career in Cybersecurity Management.

What can I study in Cybersecurity?

  • Bachelor's of Science in Business

    Learn core business knowledge and prepare for a career in cybersecurity across diverse industry sectors including finance, healthcare, government and defense. The Cybersecurity Management emphasis will train you for entry level and mid-level cybersecurity roles and you will develop necessary skills and competencies to handle day-to-day cybersecurity operations and program in organizations.

  • Masters of Business Administration

    The Cybersecurity Management emphasis will provide you with foundations in fundamental business disciplines along with a comprehensive understanding of cybersecurity concepts and technologies. This area of emphasis will enhance your understanding of complexities involved with the adoption of security technologies, achieving regulatory compliance and implementing cybersecurity programs to mitigate risks and secure information assets. Overall, the program will enable professionals to effectively govern cybersecurity in an organization.

  • Executive Education

    The Office of Professional and Executive Development can help companies and professionals achieve desired business priorities and objectives through custom programs. Custom training is facilitated by top College of Business faculty members and highly regarded trainers from around the nation. Academic research is blended with real-world business acumen to deliver a one-of-a-kind learning experience. Contact our executive education office to learn more about custom programs in cybersecurity. 

Cyber Fellows

Cybersecurity Research

Identifying factors of Information Security Culture: An Exploratory Study

by Gurvirender P.S. Tejay, UCCS, and Zareej A. Mohammed, State University of New York College 

The continuous information security failures in organizations have led focus towards organizational culture. It is argued that the development of culture of information security would subsequently lead to a secure organization. However, limited studies have been conducted to understand information security culture. In order to cultivate a culture of information security, it is imperative to develop methods that would allow some manner of assessment. In this research study, we follow survey research method to identify factors of information security culture in an organization and develop an instrument using exploratory factor analysis. The underlying theory is Hall’s (1959) primary message systems. The data was collected from 300 participants from southeast United States. Our findings indicate that group cohesiveness, professional code, information security awareness, work practices, planning and empowerment are important factors of information security culture.