This course discusses and explains the fundamentals of risk governance, the processes to follow, compliance regulation, and the security controls to implement for specific cybersecurity environments and situations. Information and information systems are subject to serious threats that can have adverse impacts on
organizational operations (including mission, functions, image, and reputation). Cyber-attacks are often aggressive, well-organized, well-funded, and in a growing number of documented cases, very sophisticated. There is also a geopolitical part to cybersecurity as well that is discussed throughout this course. Successful attacks on public and private sector information systems can affect organizational assets, individuals, other organizations, and the Nation by compromising the confidentiality, integrity, or availability of information being processed, stored, or transmitted by those systems. This can result in serious damage to the national and economic security interests of the United States.