From the course: Building and Auditing a Cybersecurity Program
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Risk management process to prioritize cyber defense
From the course: Building and Auditing a Cybersecurity Program
Risk management process to prioritize cyber defense
- [Instructor] The cyber risk management process generally follows four steps. Risk identification, risk assessment, risk mitigation, and risk monitoring. The first step is risk identification. Risk identification is a process of determining risks that could potentially prevent the organization from achieving its objectives. Basic approach that all risk identification methodologies tend to follow is, identify your assets, identify the threats to those assets, identify your vulnerabilities to those threats. We cannot protect everything so start by identifying the most valuable assets that must be protected. Cybersecurity is a constantly evolving field, making risk identification and moving target. For this reason, it is essential to participate in the cybersecurity community where information is shared with others. It is useful to subscribe to a threat and vulnerability sharing organization to determine what threats…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Adopt security frameworks to drive cybersecurity governance5m 8s
-
Consider laws and regulations in cybersecurity governance4m 13s
-
(Locked)
Policies, standards, and procedures to govern cybersecurity5m 31s
-
(Locked)
Roles and responsibilities for cybersecurity governance4m 56s
-
(Locked)
Cyber risk management program for cybersecurity governance4m 36s
-
(Locked)
Risk management process to prioritize cyber defense6m 6s
-
-
-
-
-
-
-
-