{"id":2593,"date":"2025-09-18T12:26:06","date_gmt":"2025-09-18T16:26:06","guid":{"rendered":"https:\/\/carleton.ca\/irrg\/?page_id=2593"},"modified":"2026-05-08T19:09:16","modified_gmt":"2026-05-08T23:09:16","slug":"cyber-security-threat-environment-for-managers-cstem","status":"publish","type":"page","link":"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/","title":{"rendered":"Cyber Security Threat Environment For Managers (CSTEM)"},"content":{"rendered":"<section style=\"font-family: system-ui, -apple-system, 'Segoe UI', Roboto, Helvetica, Arial, sans-serif; color: #111; background: #f7f7f7; padding: 24px; border-radius: 16px; box-shadow: 0 8px 24px rgba(0,0,0,.06); max-width: 900px; margin: 0 auto;\" aria-labelledby=\"cstem-title\">\n<header style=\"text-align: center;\">\n<span style=\"display: inline-block; letter-spacing: .08em; font-size: 12px; font-weight: bold; text-transform: uppercase; color: #7a0007; background: #fde7ea; padding: 6px 10px; border-radius: 999px;\">CSTEM<\/span><\/p>\n<h1 id=\"cstem-title\" style=\"margin: .5rem 0 0; font-size: clamp(22px,3vw,32px); line-height: 1.15; font-weight: 800; color: #000;\">Cyber Security Threat Environment for Managers (CSTEM)<\/h1>\n<div style=\"width: 72px; height: 3px; background: #C8102E; border-radius: 4px; margin: 10px auto 12px;\"><\/div>\n<p style=\"color: #333; margin: .25rem auto 1.25rem; max-width: 70ch;\">\nThis course is one of the essential courses required for certification and designation as a Security and Resilience Professional\/Manager under the Infrastructure Resilience Research Group, IRRG, Office of the Dean, Faculty of Engineering and Design, Carleton University.\n<\/p>\n<\/header>\n<div style=\"display: flex; flex-wrap: wrap; gap: 10px; justify-content: center;\" role=\"list\" aria-label=\"Course facts\">\n<div style=\"flex: 0 1 200px; background: #fff; border: 1px solid #e5e7eb; border-radius: 10px; padding: 12px; text-align: center;\" role=\"listitem\">\n<h3 style=\"font-size: 12px; text-transform: uppercase; letter-spacing: .06em; color: #475569; margin: 2px 0 4px;\">Dates<\/h3>\n<p style=\"margin: 0; font-weight: 600; line-height: 1.25;\">March 23\u201324, 2026<\/p>\n<p style=\"margin: 0; font-weight: 600; line-height: 1.25;\">December 7\u20138, 2026<\/p>\n<\/div>\n<div style=\"flex: 0 1 200px; background: #fff; border: 1px solid #e5e7eb; border-radius: 10px; padding: 12px; text-align: center;\" role=\"listitem\">\n<h3 style=\"font-size: 12px; text-transform: uppercase; letter-spacing: .06em; color: #475569; margin: 2px 0 4px;\">Location<\/h3>\n<p style=\"margin: 0; font-weight: 600; line-height: 1.25;\">ARC Hotel<\/p>\n<p style=\"margin: 0; font-weight: 600; line-height: 1.25;\">140 Slater Street, Ottawa, Ontario<\/p>\n<\/div>\n<div style=\"flex: 0 1 200px; background: #fff; border: 1px solid #e5e7eb; border-radius: 10px; padding: 12px; text-align: center;\" role=\"listitem\">\n<h3 style=\"font-size: 12px; text-transform: uppercase; letter-spacing: .06em; color: #475569; margin: 2px 0 4px;\">Cost<\/h3>\n<p style=\"margin: 0; font-weight: 600; line-height: 1.25;\">$2,200.00 + HST<\/p>\n<p style=\"margin: 0; font-size: 11px; color: #475569; line-height: 1.25;\">2-day course<\/p>\n<\/div>\n<\/div>\n<div style=\"background: #fff; border-left: 4px solid #b00020; padding: 12px 16px; margin-top: 14px;\">\n<p style=\"margin: 0; font-size: 14px;\">\n<strong>Delivery format:<\/strong> This course is offered in person or virtually. Please specify your preference when submitting registration.\n<\/p>\n<\/div>\n<div style=\"display: flex; flex-wrap: wrap; gap: 10px; justify-content: center; align-items: center; background: #fde7ea; border: 1px solid #f5c2c7; border-radius: 12px; padding: 12px; text-align: center; margin-top: 14px;\" role=\"region\" aria-label=\"Registration\">\n<a style=\"display: inline-block; background: #C8102E; color: #fff; padding: 8px 14px; border-radius: 999px; font-weight: bold; text-decoration: none; font-size: 14px;\" href=\"https:\/\/www.savoiesecurityassociates.ca\/copy-of-registration\" aria-label=\"Register for CSTEM course\">Register Now<\/a>\n<\/div>\n<section style=\"background: #fff; border: 1px solid #e5e7eb; border-radius: 14px; padding: 16px; margin-top: 14px;\" aria-labelledby=\"cstem-summary-title\">\n<h2 id=\"cstem-summary-title\" style=\"font-size: 19px; font-weight: 800; color: #000; margin: 0 0 10px;\">Course Summary<\/h2>\n<p style=\"margin: 0 0 10px; color: #111; font-size: 14px;\">\nThis course is designed to bring together IT, ICS, control room managers, security professionals, managers, and generalists who must work together to address the impacts of cyber attacks on an organization.\n<\/p>\n<p style=\"margin: 0; color: #111; font-size: 14px;\">\nDuring a cyber attack, it is imperative to work as a team and not in silos. Having the knowledge, understanding, and a common vocabulary to communicate during a cyber incident is also a critical requirement.\n<\/p>\n<\/section>\n<section style=\"background: #fff; border: 1px solid #e5e7eb; border-radius: 14px; padding: 16px; margin-top: 14px;\" aria-labelledby=\"cstem-modules-title\">\n<h2 id=\"cstem-modules-title\" style=\"font-size: 19px; font-weight: 800; color: #000; margin: 0 0 10px;\">Course Modules<\/h2>\n<div style=\"display: grid; grid-template-columns: repeat(auto-fit, minmax(260px, 1fr)); gap: 10px;\">\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px; font-size: 15px;\">1) Roles and Responsibilities<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">\nRoles and responsibilities of IT, ICS, cyber security experts, security professionals, managers, analysts, and reporting requirements to senior managers and executives.\n<\/p>\n<\/article>\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px; font-size: 15px;\">2) Threat Landscape and Actionable Response<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">\nRecent cyber attacks, their characteristics, attacker tradecraft, assessment methodologies, and the impact of AI on cybersecurity.\n<\/p>\n<\/article>\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px; font-size: 15px;\">3) Scenario Exercises<\/h4>\n<ul style=\"margin: 0; padding-left: 18px; color: #475569; font-size: 14px;\">\n<li>Specific cyber countermeasures<\/li>\n<li>Effective measures to prevent attacks<\/li>\n<li>How attackers leverage man-in-the-middle tools to intercept seemingly secure networks<\/li>\n<li>Use of network devices, including firewalls and intrusion detection systems, to increase the intelligence value of logs and alerts during investigations<\/li>\n<\/ul>\n<\/article>\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px; font-size: 15px;\">Hands-on Demonstration<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">\nDemonstration of how hackers gain access to files, tools and techniques used, including Linux Operating System, Pineapple, Flipper Zero, Python, social media vulnerability exposures and mitigation strategies, cloning of devices, and related techniques.\n<\/p>\n<\/article>\n<\/div>\n<\/section>\n<section style=\"background: #fff; border: 1px solid #e5e7eb; border-radius: 14px; padding: 16px; margin-top: 14px;\" aria-labelledby=\"cstem-outcomes-title\">\n<h2 id=\"cstem-outcomes-title\" style=\"font-size: 19px; font-weight: 800; color: #000; margin: 0 0 10px;\">Learning Outcomes<\/h2>\n<ul style=\"margin: 8px 0 0 18px; color: #111; font-size: 14px;\">\n<li style=\"margin: 6px 0;\">Have a better understanding of the roles and responsibilities of all key officials involved in addressing cyber threats to an organization.<\/li>\n<li style=\"margin: 6px 0;\">Know and understand common cybersecurity terminologies.<\/li>\n<li style=\"margin: 6px 0;\">Understand cybersecurity concepts and processes to communicate effectively and help break down silos in the workplace.<\/li>\n<li style=\"margin: 6px 0;\">Gain a better understanding of cyberattack defense methodologies and the evolving complexities of attacks.<\/li>\n<\/ul>\n<p style=\"margin: 10px 0 0; color: #111; font-size: 14px;\">\nUpon successful completion, participants will be issued an IRRG certificate indicating that they have gained the acquired knowledge and understanding to communicate with peers, senior managers, and executives.\n<\/p>\n<\/section>\n<section style=\"background: #fff; border: 1px solid #e5e7eb; border-radius: 14px; padding: 16px; margin-top: 14px;\" aria-labelledby=\"cstem-audience-title\">\n<h2 id=\"cstem-audience-title\" style=\"font-size: 19px; font-weight: 800; color: #000; margin: 0 0 10px;\">Who Should Attend<\/h2>\n<p style=\"margin: 0 0 8px; font-size: 14px;\">\nProfessionals, managers, and generalists who have taken the Essentials of Cyber Security (ECS) training.\n<\/p>\n<p style=\"margin: 0; font-size: 14px;\">\nIT, ICS, and Control Room Supervisors who want to update their knowledge of ongoing cyber threats.\n<\/p>\n<\/section>\n<section style=\"background: #fff; border: 1px solid #e5e7eb; border-radius: 14px; padding: 16px; margin-top: 14px;\" aria-labelledby=\"cstem-instructors-title\">\n<h2 id=\"cstem-instructors-title\" style=\"font-size: 19px; font-weight: 800; color: #000; margin: 0 0 10px;\">Course Instructors<\/h2>\n<div style=\"display: grid; grid-template-columns: repeat(auto-fit, minmax(260px, 1fr)); gap: 10px;\">\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px;\">Felix Kwamena, Ph.D.<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">\nAdjunct Research Professor, Department of Systems and Computer Engineering \/ Director, Infrastructure Resilience Research Group (IRRG)\n<\/p>\n<\/article>\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px;\">Jerry Shelest<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">\nIRRG Research Associate \/ Strategic Cybersecurity Analyst\n<\/p>\n<\/article>\n<\/div>\n<\/section>\n<div style=\"display: flex; flex-wrap: wrap; gap: 10px; justify-content: center; align-items: center; background: #fde7ea; border: 1px solid #f5c2c7; border-radius: 12px; padding: 12px; text-align: center; margin-top: 14px;\" role=\"region\" aria-label=\"Registration\">\n<p style=\"margin: 0; font-size: 12px;\">\n<strong>Certificate:<\/strong> Participants receive an official IRRG certificate upon successful completion.\n<\/p>\n<p><a style=\"display: inline-block; background: #C8102E; color: #fff; padding: 8px 14px; border-radius: 999px; font-weight: bold; text-decoration: none; font-size: 14px;\" href=\"https:\/\/www.savoiesecurityassociates.ca\/copy-of-registration\" aria-label=\"Register for CSTEM course\">Register Now<\/a>\n<\/div>\n<p style=\"font-size: 12px; color: #475569; margin-top: 8px;\">Last updated: February 16, 2026<\/p>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>CSTEM Cyber Security Threat Environment for Managers (CSTEM) This course is one of the essential courses required for certification and designation as a Security and Resilience Professional\/Manager under the Infrastructure Resilience Research Group, IRRG, Office of the Dean, Faculty of Engineering and Design, Carleton University. Dates March 23\u201324, 2026 December 7\u20138, 2026 Location ARC Hotel [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":0,"parent":41,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security Threat Environment For Managers (CSTEM) - Infrastructure Resilience Research Group<\/title>\n<meta name=\"description\" content=\"CSTEM Cyber Security Threat Environment for Managers (CSTEM) This course is one of the essential courses required for certification and designation as a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/\",\"url\":\"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/\",\"name\":\"Cyber Security Threat Environment For Managers (CSTEM) - Infrastructure Resilience Research Group\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/irrg\/#website\"},\"datePublished\":\"2025-09-18T16:26:06+00:00\",\"dateModified\":\"2026-05-08T23:09:16+00:00\",\"description\":\"CSTEM Cyber Security Threat Environment for Managers (CSTEM) This course is one of the essential courses required for certification and designation as a\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/irrg\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Training and Development Courses\",\"item\":\"https:\/\/carleton.ca\/irrg\/training-2\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Security Threat Environment For Managers (CSTEM)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/irrg\/#website\",\"url\":\"https:\/\/carleton.ca\/irrg\/\",\"name\":\"Infrastructure Resilience Research Group\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/irrg\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Threat Environment For Managers (CSTEM) - Infrastructure Resilience Research Group","description":"CSTEM Cyber Security Threat Environment for Managers (CSTEM) This course is one of the essential courses required for certification and designation as a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/","url":"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/","name":"Cyber Security Threat Environment For Managers (CSTEM) - Infrastructure Resilience Research Group","isPartOf":{"@id":"https:\/\/carleton.ca\/irrg\/#website"},"datePublished":"2025-09-18T16:26:06+00:00","dateModified":"2026-05-08T23:09:16+00:00","description":"CSTEM Cyber Security Threat Environment for Managers (CSTEM) This course is one of the essential courses required for certification and designation as a","breadcrumb":{"@id":"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/irrg\/"},{"@type":"ListItem","position":2,"name":"Training and Development Courses","item":"https:\/\/carleton.ca\/irrg\/training-2\/"},{"@type":"ListItem","position":3,"name":"Cyber Security Threat Environment For Managers (CSTEM)"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/irrg\/#website","url":"https:\/\/carleton.ca\/irrg\/","name":"Infrastructure Resilience Research Group","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/irrg\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"acf":{"banner_image_type":"none","banner_button":"no"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/pages\/2593"}],"collection":[{"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/comments?post=2593"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/pages\/2593\/revisions"}],"predecessor-version":[{"id":2601,"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/pages\/2593\/revisions\/2601"}],"up":[{"embeddable":true,"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/pages\/41"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/media?parent=2593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}