Cybersecurity Regulatory Compliance
COM SCI X 420.7
The class will examine relevant policies and regulations along with auditing practices. Topics covered include auditing standards and ethics, privacy, intellectual property, and legal issues in cyberspace.
What you can learn.
- Identify relevant information system security regulations
- Explain the relevance of auditing an information system
- Identify relevant privacy regulations
- Plan a compliance audit
About this course:
Over the last few years, several government agencies, the health care industry, and major retailers have reported the theft of personal information of millions of consumers and employees. Yet all of those organizations were most likely required to have compliant and effective information security programs. Organizations that fail to follow regulatory requirements can end up paying substantial fines. Information security programs are built around security control frameworks, including compliance audits. The class examines relevant policies and regulations, along with auditing practices. Topics covered include auditing standards and ethics, privacy, intellectual property, and legal issues in cyberspace. Specific policies and regulations include information security governance, the Sarbanes-Oxley Act, consumer financial regulations such as the Graham-Leach-Bliley Act and the Payment Card Industry Data Security Standard, health care regulations such as Health Insurance Portability and Accountability Act, and other relevant federal and state regulations.
Prerequisites
COM SCI X 420.1 Fundamentals of Information Systems Security.
Corporate Education
Learn how we can help your organization meet its professional development goals and corporate training needs.
Donate to UCLA Extension
Support our many efforts to reach communities in need.