A New Master’s in Business Cybersecurity
Cybersecurity Degree Principles, Packaged in a Business Degree
Introducing the online Master of Science in Business Cybersecurity (MSBC) from the University of Tennessee, Knoxville’s Haslam College of Business
Are You Ready to Lead an Emerging Field?
The term “business cybersecurity” may be unfamiliar to some. It likely won’t be for long.
Cybercrime poses one of the most pressing business threats in the digital era. It caused $3 trillion in losses in 2015—and by 2025, cybercrime will cost the global economy an expected $10.5 trillion.1 With those numbers, it’s no wonder 93% of survey respondents from the 2023 Global Cybersecurity Outlook report believe that a catastrophic cybersecurity event is bound to happen in the next two years.2
Based on current employment numbers, the world economy is unprepared to manage a crisis of such magnitude. An International Information Systems Security Certification Consortium study discovered that the international workforce needs to grow by 72% to meet the current demand for cybersecurity professionals. For a global workforce already 4.7 million strong, that translates to a gap of 3.4 million workers.3
$10.5 trillion in cybercrime-related damages expected by 2025.
93% of cyber leaders anticipate a cybercrime catastrophe in the next two years.
3.4 million professionals are needed to fill the cybersecurity workforce gap.
“Cyber resilience equals business resilience.”
Julie Sweet, Accenture Chief Executive Officer, 2023 World Economic Forum
So What Do These
Statistics Mean for You?
Accenture Chief Executive Officer Julie Sweet said it best during her presentation at the 2023 World Economic Forum meeting. She charged global leaders with understanding that “cyber resilience equals business resilience,”4 confirming the critical need for companies to develop sound business cybersecurity strategies.
That means going beyond end-to-end encryption. It means bringing cybersecurity conversations to the forefront of boardroom discussions and overall business strategy. Under Sweet’s direction, Accenture’s monthly board meetings now include a review of cyber incidents, illustrating the shift in mindset she’s urging other leaders to adopt.
That’s Where You Come In.
As more companies learn to equate cybersecurity resilience with business stability, they’ll need qualified professionals to direct those conversations and decisions.
Our innovative master’s program lays the principal groundwork of business cybersecurity concepts. Along with sound technical training, we provide graduates with the fluency to comprehend, communicate, and employ business strategies crucial to protecting data—and accordingly, the bottom line.
Together, we can give the global economy the guidance it so desperately needs. Explore our online MS in business cybersecurity curriculum below.
Through a combination of synchronous and asynchronous sessions, students will learn how to leverage cybersecurity foundations to better inform business strategy.
Provides students with a foundational knowledge of concepts, theories, technologies, and procedures underlying the protection of information assets. Students work with a variety of tools to enhance their knowledge and technology skills in this ever-changing area.
Designed to help students gain an understanding of the regulatory environment, governance, and ethical issues related to cybersecurity. The objective of the course is for students to understand how an organization effectively controls information technology (IT) security and manages associated ethical issues.
Provides students with an underlying knowledge of communication systems and network design. It builds on this foundation to define and identify internal and external sources of network security risk. Students will work with various tools, techniques, and methods to assess communication networks and develop and communicate mitigation strategies to reduce network and overall cybersecurity risk.
Introduces the components, processes, and techniques associated with protecting organizational information assets. Students will work with a variety of modern database management and monitoring tools to develop business and technical skills related to management and protection of a broad range of information assets.
Introduces the process and techniques of corporate risk management and business continuity, including its major activities such as risk assessment, risk mitigation, and risk control. Students will learn how to assess, develop, and implement effective risk management practices to meet business continuity objectives.
Provides students with an understanding of the human and organizational aspects of security and methods to mitigate risks associated with these areas. Students will work with various tools, techniques, and methods to assess organizational security practices and develop and communicate strategies to reduce overall cybersecurity risk.
Covers the fundamentals of designing and implementing a multi-tier security architecture, focusing on the processes and tools used to protect assets and resources housed on organization servers. Students will work with a variety of tools and techniques to develop knowledge and technical skills related to the assessment, design, and management of an organization’s security architecture.
Designed to help students gain a fundamental knowledge of secure software development practices. The objective of the course is for students to understand how an organization formulates and manages software development processes where security is built in and ensures confidentiality, integrity, and availability in software applications. Students will work with various tools, techniques, and methods associated with the development, implementation, and management of organizational software applications.
A seminar designed to spotlight and examine technology innovations that are impacting (disrupting and transforming) the dynamic field of business cybersecurity. The course will focus on the potential opportunities and risks associated with trending and emerging technologies.
Enables students to integrate their learning from all prior coursework. Students will work on a broad array of contemporary cybersecurity problems and issues experienced by organizations. Students will have the opportunity to assess, analyze, and solve cybersecurity problems and present their results and solutions as aspiring cybersecurity managers.
Ready to join the Volunteer community? Our streamlined application aims to recruit impassioned master’s candidates by focusing on a few key components: a personal statement, a resume or CV, and undergraduate transcripts. That’s right—we don’t require any standardized tests or letters of recommendation. Review our complete admissions process and begin your application today.Request Information Apply Now
Looking for an answer not listed on our site? Connect with our team today to get answers to your top questions.EMAIL THE ENROLLMENT TEAM
We do not require a technical background to apply.
Students from all academic and professional backgrounds will be considered for admission. While this is not a technical degree, applicants should have a basic interest in understanding cybersecurity foundations and their business applications.
Yes, international students are eligible to apply; they must submit a Test of English as a Foreign Language (TOEFL) score with their materials. Please note that international students enrolling in fully online master’s programs like the MSBC are not eligible to receive sponsorship for an F-1 visa.
As a part-time student, you can complete the degree in as few as two years. However, the program is designed to be flexible, allowing you to take courses at your own pace and earn the degree over a span of up to six years.
Online MSBC graduates will be prepared to plan and communicate a synthesized business and cybersecurity strategy. Given that business cybersecurity is an emerging field, the following list of potential career paths is by no means comprehensive or limiting:
- Business cybersecurity analysis
- Cybersecurity consulting
- Business cybersecurity risk mitigation
- Cybersecurity auditing
In addition to providing guidance on the application process, enrollment advisors can answer questions about scheduling, curriculum, student experience, and more.
- 1 Cybersecurity Ventures, 2020
- 2 Forbes, 2023
- 3 International Information Systems Security Certification Consortium, 2022
- 4 Forbes, 2023