Your browser is outdated!

To ensure you have the best experience and security possible, update your browser. Update now

×

Badr Bakhat

Badr Bakhat

Sustainability Leader | Humanitarian with Team Rubicon | Lean Six Sigma Black Belt Process Engineer | Polyglot

Freelancer Available
I'm a passionate leader with a diverse skillset spanning sustainability, process optimization, and international business development. I drive positive change by guiding clients towards responsible practices and implementing innovative solutions to optimize manufacturing, logistics, and marketing strategies. Throughout my over-15-years career, I've always succeeded in delivering impactful results, from generating substantial cost savings to exceeding sales targets without ever compromising the quality of delivered goods and/or services. I'm a data-driven problem solver with a proven ability to lead cross-functional teams and deliver measurable results across a range of industries and countries

Certification-Cybersecurity Risk Management

Harvard University

February 2019 to May 2019
Details and Extracurriculars
  • MODULE 1 - CYBERSECURITY RISK IS BUSINESS RISK
    Explore the concept of risk management frameworks that help ensure an organization’s cybersecurity. Module 1 introduces six noteworthy cases of security breaches that highlight the risk of insecure information systems and the importance of implementing adequate risk management frameworks. These cases are drawn on throughout the course to bolster theory with tangible examples. The second half of the module will discuss operational business risk, litigation risk, and reputational risk.
  • MODULE 2 - IDENTIFYING THE THREATS TO AN ORGANIZATION
    Investigate the threats to an organization’s critical business systems and data by understanding the sources of pertinent cybersecurity threat actors and the methods commonly used to infiltrate an organization’s security systems. Explore three types of threat actors, namely nation states, cybercriminals, and internal organizational
    threats, including the methods they are likely to employ, and the types of organizations or sectors they typically attack.
    Begin work on an ongoing real-world application project that will conclude in Module 8 by analyzing the vulnerabilities of your own organization to identify potential threats posed by nation states, cybercriminals, and insiders. Alternatively, students can choose to complete their project using a case study of the Sony Pictures hack of 2014.
  • MODULE 3 - IDENTIFYING IMPORTANT BUSINESS SYSTEMS AND ASSETS
    Identify internal assets and business critical systems (BCSs) that need to be protected from cyberattack if an organization is to function effectively and efficiently. Explore the degree of risk in relation to an organization’s systems, networks, and data. Gain foundational knowledge to better evaluate and understand the implications on internal processes, and how these assets and systems should be protected. Using a chosen organization, or the case study provided, identify BCSs that are affected when the integrity of an organization’s systems, networks, and data are compromised, and describe how the interruption caused by an attack affects its capability to perform everyday functions.
  • MODULE 4 - THE CRUCIAL ROLE OF LEADERSHIP IN MANAGING CYBER RISK
    Understand the role of leadership in ensuring an organization maintains an effective strategy for keeping its cybersecurity systems up-to-date, and learn to identify stakeholders in the leadership and governance structure of an organization who play a key role in managing cybersecurity. Learn how to assess whether sufficient management processes have been put in place to mitigate the risk of cyberattack. Invoke a sense of appreciation in others for security awareness and training, and design best practices for implementing a training program in an organization. As part of your ongoing project, develop a cybersecurity leadership plan that considers effective management processes to mitigate cyber threats, either for your own organization or for the case study provided.
  • MODULE 5 - UNDERSTANDING YOUR TECHNOLOGY
    Examine the importance of implementing appropriate technologies to mitigate the risk of cyber threats. Understand how to recommend technologies to secure the three key dimensions of an organization’s cybersecurity, namely the system, the network, and crucial data. You’ll be assessed on your understanding of how an organization’s systems, networks, and data interconnect and the various methods of attack and countermeasures in relation to each dimension. You’ll also be required to identify appropriate technologies for managing the cyber safety of these three elements.
  • MODULE 6 - CYBER RISK AND THE LAW
    Navigate one of the most complex aspects of managing cyber risk, namely legal and compliance considerations at a state, national, and international level. Identify the impact of failing to take legal and compliance considerations into account and explore the requirements of your own organization’s sector while learning to ask appropriate questions that assess an organization’s adherence to these legal and compliance requirements.
  • MODULE 7 - INCIDENT RESPONSE AND ACCOUNTABILITY
    Learn the appropriate response to a breach in an organization’s cybersecurity. The module focuses on three phases of a security breach, namely detection of the breach, communication of the breach, and containment of the breach. In each of the three phases, you’ll be provided with an overview of the roles played by notable actors, and the processes that need to be implemented to mitigate any damage caused by a cybersecurity breach. As part of your ongoing project, you’ll be required to propose an effective incident response plan that addresses a cybersecurity breach. This includes describing proactive measures for how you would detect the breach, the chain of communication that would be followed, and strategies for containing the breach to avoid further damage.
  • MODULE 8 - DESIGNING AND IMPLEMENTING A MITIGATION STRATEGY
    Understand the critical focal points that should be included in an effective mitigation strategy, while further exploring topics such as the implications around implementation, the allocation of financial resources, and establishing an accurate metrics system to keep track of the security systems that have been put in place. Module 8 concludes with a discussion that explores the future direction of cybersecurity, particularly in light of the evolving landscapes of artificial intelligence, big data, and geolocational data, and the increased organizational risks that accompany these advances. In the final aspect of your ongoing project, you’ll bring together the knowledge you have gained in all preceding modules to design a risk mitigation strategy for your own organization, or continue with the case study provided.