From the course: Building and Auditing a Cybersecurity Program

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Risk management process to prioritize cyber defense

Risk management process to prioritize cyber defense

From the course: Building and Auditing a Cybersecurity Program

Risk management process to prioritize cyber defense

- [Instructor] The cyber risk management process generally follows four steps. Risk identification, risk assessment, risk mitigation, and risk monitoring. The first step is risk identification. Risk identification is a process of determining risks that could potentially prevent the organization from achieving its objectives. Basic approach that all risk identification methodologies tend to follow is, identify your assets, identify the threats to those assets, identify your vulnerabilities to those threats. We cannot protect everything so start by identifying the most valuable assets that must be protected. Cybersecurity is a constantly evolving field, making risk identification and moving target. For this reason, it is essential to participate in the cybersecurity community where information is shared with others. It is useful to subscribe to a threat and vulnerability sharing organization to determine what threats…

Contents