An overview of cyber risks, along with the laws and regulations that apply to the rapidly changing threat landscape of cybersecurity. We will explore the impacts of data breaches, data privacy challenges, cyber-criminal motives, and common strategies used to combat cyber warfare. After studying the strategies and challenges of preserving the confidentiality, integrity, and availability of sensitive information such as personally identifiable information (PII), financial information, and protected health information (PHI), you will develop a cybersecurity risk mitigation strategy for your workplace or personal data.