The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.

Courtlyn
Promotion and Events SpecialistBuild your cyber defense capabilities to protect your organisation’s most critical information—and your own
TBD
2 months, online
4-6 hours per week
Our participants tell us that taking this programme together with their colleagues helps to share common language and accelerate impact.
We hope you find the same. Special pricing is available for groups.
The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.
Courtlyn
Promotion and Events SpecialistBased on the information you provided, your team is eligible for a special discount, for Cyber Security for Business & Risk Management starting on TBD .
We’ve sent you an email with enrolment next steps. If you’re ready to enrol now, click the button below.
Have questions? Email us at group-enrollments@emeritus.org.
Apply now to enjoy XXXX off the programme fee.
Use code XXXX during payment.
WhatsApp an Advisor on +65 8014 3066
Have questions? Our Advisor will assist you promptly.
85+ Video Lectures
15+ Discussion Boards
12 Assignments
10+ Industry Examples
2 Industry Practice Tools
Real-world Case Study Simulations
The programme comprises 8 modules. Each module is led by an SMU faculty expert with field experience specific to the Cyber Security topics being discussed.
Explore the objectives of cyber security, the importance of developing a security mindset, common/best practices and principles, and robust security strategies.
Discuss the future and impact of cryptographic systems, elements of secure encryption, factors that ensure data integrity, the need for authenticated encryption systems, and how to identify robust encryption systems in cryptography.
Gain a deeper understanding of the underlying technologies in blockchain, current uses and the future of blockchain tech, the security implications of blockchain as a technology, and the strengths and weaknesses of open and closed distributed ledgers in blockchain.
Examine the drawbacks of existing data security solutions, the impact of crypto techniques on security and performance, key elements of encrypted data, and how to identify technologies that provide strong privacy protection in zero trust environments.
Explore common networking protocols and their corresponding threats, common network security defense technologies, strategies to deal with Denial-of-Service attacks, and the ways to use Wi-Fi safely.
Build your knowledge of the cyber-attack life cycle, common software vulnerabilities leading to cyber attacks, the different phases of risk management, good hygiene practices in software security, and how to identify different elements of threat identification and prioritisation.
Learn the salient aspects of cyber culture as it exists today and the importance of developing a cyber security culture, the elements of the People Process and Technology framework for a strong cyber culture foundation, and ways to provide a framework for building a cyber mindset.
Dive into the overall threat landscape of emerging technologies, the trade-offs between security and emerging technologies, potential solutions for a sustainable cyber security ecosystem, and how to assess the inadequacies of current cyber security measures against emerging technologies.
Explore the objectives of cyber security, the importance of developing a security mindset, common/best practices and principles, and robust security strategies.
Explore common networking protocols and their corresponding threats, common network security defense technologies, strategies to deal with Denial-of-Service attacks, and the ways to use Wi-Fi safely.
Discuss the future and impact of cryptographic systems, elements of secure encryption, factors that ensure data integrity, the need for authenticated encryption systems, and how to identify robust encryption systems in cryptography.
Build your knowledge of the cyber-attack life cycle, common software vulnerabilities leading to cyber attacks, the different phases of risk management, good hygiene practices in software security, and how to identify different elements of threat identification and prioritisation.
Gain a deeper understanding of the underlying technologies in blockchain, current uses and the future of blockchain tech, the security implications of blockchain as a technology, and the strengths and weaknesses of open and closed distributed ledgers in blockchain.
Learn the salient aspects of cyber culture as it exists today and the importance of developing a cyber security culture, the elements of the People Process and Technology framework for a strong cyber culture foundation, and ways to provide a framework for building a cyber mindset.
Examine the drawbacks of existing data security solutions, the impact of crypto techniques on security and performance, key elements of encrypted data, and how to identify technologies that provide strong privacy protection in zero trust environments.
Dive into the overall threat landscape of emerging technologies, the trade-offs between security and emerging technologies, potential solutions for a sustainable cyber security ecosystem, and how to assess the inadequacies of current cyber security measures against emerging technologies.
Through real-world examples from multiple industries, you'll see how the theories are put into practice. Some of these examples include.
Learn how privacy violations and poorly implemented security could allow cyber attackers to interfere with services and systems people need.
Learn about a malware attack in 2017 due to the weakest link in the information security structure.
Understand how Deutsche Bank was able to stop a fraudulent transaction due to its vigilant corporate culture.
Analyse how an attempted phishing attack could have led to compromised emails and technical data at SMU.
Learn how a phone spear phishing attack that targeted employees, resulted in huge financial losses and compromised customer data.
Note: All brand, product and company names are trademarks™ or registered® trademarks of their respective holders. Use of them does not imply any affiliation with, endorsement by, or association of any kind between them and programme owners.
The digital era comes with inherent benefits—instant access to information, global connectivity and portable devices. However, it also comes with risks, including endless opportunities for cyber criminials to exploit individuals and enterprises. Risks that often lead to data breaches that expose sensitive information, directly impacting business operations, functionality and even public perception.
As more business processes shift online at an accelerated pace, organisations must ensure that they have up-to-date systems and strategies in place to predict, prevent and counter rapidly evolving cyber attacks.
In the online Cyber Security for Business and Risk Management programme—offered by Singapore Management University—you can master the technical and functional know-how you need to manage potential cyber threats and safeguard your enterprise’s devices and services, as well as your own.
Data breach costs rose from USD 3.86 million to USD 4.24 million, the highest average total cost in the 17-year history of the IBM report.
As per a global survey in Cyber Threat Defense Report, a record 86% of organisations were affected by a successful cyber attack.
Cyber crime accounted for 43% of all crime in Singapore last year, with the COVID-19 pandemic being a key factor in online threats.
![]()
Robert H Deng, PhD
AXA Chair Professor of Cybersecurity, Director of the Secure Mobile Centre, and Deputy Dean for Faculty & Research, School of Computing and Information Systems, Singapore Management University
Robert Deng is AXA Chair Professor of Cybersecurity, Director of the Secure Mobile Centre, and Deputy Dean for Faculty & Research, School of Computing and Information Systems, Singapore Management University. He has an Msc from Illinois Institute of Technology, USA & a PhD Illinois Institute of Technology, USA. Robert's areas of specialisation include - Applied cryptography, Security protocols, Data security & privacy, Mobile systems security & IoT security.
He received the Outstanding University Researcher Award from National University of Singapore, Lee Kuan Yew Fellowship for Research Excellence from SMU, and Asia-Pacific Information Security Leadership Achievements Community Service Star from International Information Systems Security Certification Consortium. He serves/served on the editorial boards of ACM Transactions on Privacy and Security, IEEE Security & Privacy, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Information Forensics and Security, Journal of Computer Science and Technology, and Steering Committee Chair of the ACM Asia Conference on Computer and Communications Security. He is a Fellow of IEEE and Fellow of Academy of Engineering Singapore.
![]()
Debin Gao, PhD
Full-Time Faculty Associate Professor of Computer Science; Faculty Manager, SMU BSc (IS)-CMU Fast-Track Programme; Supervisor to SCIS UG Instructors
Debin Gao is Full-Time Faculty & Associate Professor of Computer Science ,as well as, Faculty Manager, Singapore Management University. Having obtained his PhD degree from Carnegie Mellon University, Debin focuses his research on software and systems security. In recent years, Debin also actively participates in research of mobile security, cloud security, and human factors in security. Debin is the program committee co-chair of international conference ICICS 2021. He's the recipient of the Lee Kong Chian Fellowship in year 2017.
![]()
Shar Lwin Khin, PhD
Full-Time Faculty Assistant Professor of Computer Science (Practice)
Dr Lwin Khin Shar is an assistant professor in School of Information Systems at SMU. He was a research scientist in School of Computer Science and Engineering, Nanyang Technological University (NTU) and a research associate at the Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg. He received his PhD and Bachelor of Engineering (honors) from NTU. He has worked on European and Industrial research projects in collaboration with industrial partners and European universities. Specifically, he worked on the analysis of software privacy leakage in collaboration with Saarland University, Germany. Dr Khin also worked on the industrial-driven research project on access control testing of distributed information sharing platform in collaboration with HITEC, International Emergency Response and Crisis Management Centre based in Luxembourg.
He also worked on requirements-driven security testing of mobile applications in collaboration with university of Geneva and industrial partners from UK and Switzerland. His current research focuses on scalable and effective analysis of security and privacy issues in web and mobile applications, using program analysis, constraint solving, search-based testing, and machine learning techniques.
![]()
Flocy Joseph, PhD
Full-Time Faculty SMU Programme Director, Executive Development
Dr Flocy Joseph joined SMU in 2012 with the Human Capital Leadership Institute as the country lead for India, servicing the Indian MNCs. Her role encompasses designing, delivering and facilitating executive development programmes for industry-specific and customised programmes for the university’s tier corporate clients. She earned her PhD in Responsible Leadership at SMU.
Dr Flocy is a certified trainer in delivering the Global Mindset Inventory and the Facet 5 personality tools. Joseph has authored various case studies on leadership, some of which have been published to global recognition. She has also led a research paper on “Cultural Transformation in the Digital World”, authored an award-winning paper on “Beta Leadership” and co-authored the book Living the Corporate Purpose: Insights from Companies in Asia.
The programme is designed for professionals from any academic background with preferably 10+ years of work experience, and is applicable across all industries, particularly IT and Finance.
It can benefit people involved in Technology, IT and Information Security functions.
This programme is especially helpful for those who are looking to:
Upon successful completion of the programme, participants will be awarded a verified digital certificate by Singapore Management University.
Download BrochureAll certificate images are for illustrative purposes only and may be subject to change at the discretion of Singapore Management University.