This is a segment in our ongoing series on cyber risks. This segment is the first in the series of segments that will address the procedures for preparing a cyber risk assessment. For a cyber risk assessment, it is essential to establish a baseline for identifying critical components that must be evaluated. As in other courses, we will utilize the National Institute of Standards and Technology (NIST) Framework as a template to assist in discussing the concepts to be considered when performing a cyber risk assessment.
This segment takes a deep dive into the “identify” function required to properly perform a cyber risk assessment. We evaluate the categories within the function of:
- Asset management
- Business environment
- Governance
- Risk assessment
- Risk Management (RM) strategy
- Supply chain risk management
Within each of these categories we examine specific objectives and procedures that should be considered in order to properly prepare your cyber risk assessment. Participants will come away with a deep understanding of the various processes required to properly identify cyber risks for their organization.
Training for all programs related to cyber security by this trainer are utilizing the framework of the National Institute of Standards and Technology (NIST) as a model. This information is freely available in the public domain. For more detailed information on the framework please refer to NIST.org.
Learning Objectives
- Explore the objectives of a cyber risk management assessment.
- Explore critical concepts involved in preparing a cyber risk assessment for your organization.
- Identify critical components of the identify function including objectives and procedures.
Included In Certifications
This course is included in the following Certification Programs:
13 CoursesCorporate Cyber Security Certification
- Cyber Threat – The Modern-Day Fraud: Breaches and Actions
- A Primer on Cyber Security Programs and Roles
- Cyber Risk Frameworks And Concepts
- Cyber Risk Framework - Identify Assets
- Cyber Risk Framework - Prioritize Assets
- Cyber Risk Framework - Protect Assets
- Cyber Risk Framework - Detect Part One
- Cyber Risk Framework - Detect Threats Part Two
- Cyber Risk Framework - Respond
- Cyber Risk Framework - Recover
- Cyber Risk Framework - Utilizing The Tier Approach
- Fraud and Personal Identity Theft
- Fraud and Business Identity Theft
31 Reviews (150 ratings)
Prerequisites
No Advanced Preparation or Prerequisites are needed for this course. However, it is recommended to take the other courses in the series prior to completing this one.