Cyber Security Risk Management
What you'll learn
- Develop an understanding of what risk is and how it can be managed.
- How to create a risk management framework within your organisation.
- How to identify, assess and articulate risk as well as identifying options for treatment and determining which is the most appropriate.
- How to perform detailed analysis of risk and develop risk treatment plans.
- How to apply risk management concepts in practice including developing a risk register, governance models, risk bowties and reporting.
Requirements
- No special requirements.
Description
In this course you will gain a solid understanding of risk management principles, processes, frameworks and techniques that can be applied specifically to cyber security as well as risk in general.
You will learn how to identify, assess and articulate risk as well as options available for treating risk and which may be most appropriate for your situation.
This course also provides examples of tools and techniques as well as useful tips that can help you to successfully implement and maintain a risk management framework within your organization.
Who this course is for:
- Information Technology Managers
- Information/Cyber Security Managers
- Information Security Professionals
- Anyone with an interest in gaining a general understanding of risk management as well as how it applies to information security
Course content
- Preview01:50
- 02:27What Is Risk?
- 05:19IT & Cyber Security Risk
- 03:06Components of a Risk
- 07:00Articulating Risk
Instructor
A highly experienced information security consultant and manager with diverse experience across multiple industries and organizations of various sizes. Combining a highly technical background with solid communication and presentation skills provides the ability to translate complex concepts into easy to understand, plain English terms.
Various roles undertaken include information security management, architecture, consulting, governance, risk management, project management, auditing, vendor management and operations.
Tertiary qualifications include a Master of Information Systems Security, Bachelor of Science and Diploma in Education.
Industry certifications include CISM, CRISC, CISA, CISSP, CCIH, Security+, MCSE, MCT, Microsoft Azure, Amazon Web Services, ITIL, Citrix and PRINCE2.
Living in Sydney, Australia with wife and two children.