Risk Management for Cybersecurity and IT Managers

Course

Online

£ 100 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

The Management's Guide to Understanding Risk Management Decisions in Cyber-security and Information Technology (IT)!Have you ever wondered why your organization's executives or your manager made a decision to fund or not fund your project? In this course, you will get an inside look at how cyber-security and information technology (IT) managers determine which projects they will support with funding and which they won't based on a preliminary risk analysis. Over the past two decades, I have worked in the cyber-security and information technology realm, fighting for my projects to become funded. Early in my career, I didn't understand why certain projects would be funded and executed, while others wouldn't. What I learned, it all came down to risk management by our executives and managers. You will learn the terms used by executives and managers in discussing risk management, and how to apply the concepts of risk management to your networks, systems, and projects. This course is not an operational or tactical course that focuses on how you will secure your networks, but instead focuses on the mindset of managers and teaches you how to think like they do. Once you master these concepts, it is much easier to build your business case for your projects and justify your budgetary needs. This course also includes two case studies of what happens when risk management fails, as demonstrated by the Amazon Web Services outage and Equifax data breach that both occurred in 2017.About the Author
.
Jason Dion, CISSP No

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Understand the foundations of risk management in the cyber-security and information technology field. Be able to use qualitative risk measurement techniques when discussing networks and projects. Be able to use quantitative risk measurement techniques when discussing networks and projects. Discuss current events in the technology space in relation to risk management decisions

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • IT risk
  • Technology
  • Web
  • Networks
  • Risk Management
  • Risk

Course programme

Introduction 1 lecture 01:30 Introduction In this video, there is a short description from the author. Introduction 1 lecture 01:30 Introduction In this video, there is a short description from the author. Introduction In this video, there is a short description from the author. Introduction In this video, there is a short description from the author. Introduction In this video, there is a short description from the author. Introduction In this video, there is a short description from the author. In this video, there is a short description from the author. In this video, there is a short description from the author. What is Risk? 4 lectures 17:39 What is Risk? We will discuss the three major components of risk: assets, vulnerabilities, and threats. Types of Risk You will learn the different types of risk that exist in the business world and in our IT networks. Types of Threats We will discuss the different types of threats that our networks and businesses face. When Risk Management Fails We will breakdown what happens when Risk Management fails by examining the Amazon Web Services outage from 2017 that took down nearly the entire East Coast region! What is Risk? 4 lectures 17:39 What is Risk? We will discuss the three major components of risk: assets, vulnerabilities, and threats. Types of Risk You will learn the different types of risk that exist in the business world and in our IT networks. Types of Threats We will discuss the different types of threats that our networks and businesses face. When Risk Management Fails We will breakdown what happens when Risk Management fails by examining the Amazon Web Services outage from 2017 that took down nearly the entire East Coast region! What is Risk? We will discuss the three major components of risk: assets, vulnerabilities, and threats. What is Risk? We will discuss the three major components of risk: assets, vulnerabilities, and threats. What is Risk? We will discuss the three major components of risk: assets, vulnerabilities, and threats. What is Risk? We will discuss the three major components of risk: assets, vulnerabilities, and threats. We will discuss the three major components of risk: assets, vulnerabilities, and threats. We will discuss the three major components of risk: assets, vulnerabilities, and threats. Types of Risk You will learn the different types of risk that exist in the business world and in our IT networks. Types of Risk You will learn the different types of risk that exist in the business world and in our IT networks. Types of Risk You will learn the different types of risk that exist in the business world and in our IT networks. Types of Risk You will learn the different types of risk that exist in the business world and in our IT networks. You will learn the different types of risk that exist in the business world and in our IT networks. You will learn the different types of risk that exist in the business world and in our IT networks. Types of Threats We will discuss the different types of threats that our networks and businesses face. Types of Threats We will discuss the different types of threats that our networks and businesses face. Types of Threats We will discuss the different types of threats that our networks and businesses face. Types of Threats We will discuss the different types of threats that our networks and businesses face. We will discuss the different types of threats that our networks and businesses face. We will discuss the different types of threats that our networks and businesses face. When Risk Management Fails We will breakdown what happens when Risk Management fails by examining the Amazon Web Services outage from 2017 that took down nearly the entire East Coast region! When Risk Management Fails We will breakdown what happens when Risk Management fails by examining the Amazon Web Services outage from 2017 that took down nearly the entire East Coast region! When Risk Management Fails We will breakdown what happens when Risk Management fails by examining the Amazon Web Services outage from 2017 that took down nearly the entire East Coast region! When Risk Management Fails We will breakdown what happens when Risk Management fails by examining the Amazon Web Services outage from 2017 that took down nearly the entire East Coast region! We will breakdown what happens when Risk Management fails by examining the Amazon Web Services outage from 2017 that took down nearly the entire East Coast region! We will breakdown what happens when Risk Management fails by examining the Amazon Web Services outage from 2017 that took down nearly the entire East Coast region! What Can You Do With Risk? 6 lectures 13:20 What can you do with Risk? In this video, we will introduce the concepts of mitigating, transferring, avoiding, and accepting risk. Risk Mitigation In this video, we will dive deeper into the concept of Risk Mitigation. Risk Transference In this video, we will dive deeper into the concept of Risk Transference. Risk Avoidance We will dive deeper into the concept of Risk Avoidance. Risk Acceptance We will dive deeper into the concept of Risk Acceptance. Risk Controls We will discuss how risk controls are selected. What Can You Do With Risk? 6 lectures 13:20 What can you do with Risk? In this video, we will introduce the concepts of mitigating, transferring, avoiding, and accepting risk. Risk Mitigation In this video, we will dive deeper into the concept of Risk Mitigation. Risk Transference In this video, we will dive deeper into the concept of Risk Transference. Risk Avoidance We will dive deeper into the concept of Risk Avoidance. Risk Acceptance We will dive deeper into the concept of Risk Acceptance. Risk Controls We will discuss how risk controls are selected. What can you do with Risk? In this video, we will introduce the concepts of mitigating, transferring, avoiding, and accepting risk. What can you do with Risk? In this video, we will introduce the concepts of mitigating, transferring, avoiding, and accepting risk. What can you do with Risk? In this video, we will introduce the concepts of mitigating, transferring, avoiding, and accepting risk. What can you do with Risk? In this video, we will introduce the concepts of mitigating, transferring, avoiding, and accepting risk. In this video, we will introduce the concepts of mitigating, transferring, avoiding, and accepting risk. In this video, we will introduce the concepts of mitigating, transferring, avoiding, and accepting risk. Risk Mitigation In this video, we will dive deeper into the concept of Risk Mitigation. Risk Mitigation In this video, we will dive deeper into the concept of Risk Mitigation. Risk Mitigation In this video, we will dive deeper into the concept of Risk Mitigation. Risk Mitigation In this video, we will dive deeper into the concept of Risk Mitigation. In this video, we will dive deeper into the concept of Risk Mitigation. In this video, we will dive deeper into the concept of Risk Mitigation. Risk Transference In this video, we will dive deeper into the concept of Risk Transference. Risk Transference In this video, we will dive deeper into the concept of Risk Transference. Risk Transference In this video, we will dive deeper into the concept of Risk Transference. Risk Transference In this video, we will dive deeper into the concept of Risk Transference. In this video, we will dive deeper into the concept of Risk Transference. In this video, we will dive deeper into the concept of Risk Transference. Risk Avoidance We will dive deeper into the concept of Risk Avoidance. Risk Avoidance We will dive deeper into the concept of Risk Avoidance. Risk Avoidance We will dive deeper into the concept of Risk Avoidance. Risk Avoidance We will dive deeper into the concept of Risk Avoidance. We will dive deeper into the concept of Risk Avoidance. We will dive deeper into the concept of Risk Avoidance. Risk Acceptance We will dive deeper into the concept of Risk Acceptance. Risk Acceptance We will dive deeper into the concept of Risk Acceptance. Risk Acceptance We will dive deeper into the concept of Risk Acceptance. Risk Acceptance We will dive deeper into the concept of Risk Acceptance. We will dive deeper into the concept of Risk Acceptance. We will dive deeper into the concept of Risk Acceptance. Risk Controls We will discuss how risk controls are selected. Risk Controls We will discuss how risk controls are selected. Risk Controls We will discuss how risk controls are selected. Risk Controls We will discuss how risk controls are selected. We will discuss how risk controls are selected. We will discuss how risk controls are selected. Calculating Risk 4 lectures 18:06 Calculating Risk In this video, we will look into calculating risk while performing. Qualitative Risk Management We will discuss the qualitative risk measurement methods. Quantitative Risk Management We will discuss the quantitative risk measurement methods. Case Study: Equifax Data Breach (July 2017) We will discuss the Equifax data breach of July 2017, what led up to it, and the management decisions that could have prevented it. Calculating Risk. 4 lectures 18:06 Calculating Risk In this video, we will look into calculating risk while performing. Qualitative Risk Management We will discuss the qualitative risk measurement methods. Quantitative Risk Management We will discuss the quantitative risk measurement methods. Case Study: Equifax Data Breach (July 2017) We will discuss the Equifax data breach of July 2017, what led up to it, and the management decisions that could have prevented it. Calculating Risk In this video, we will look into calculating risk while performing. Calculating Risk In this video, we will look into calculating risk while performing. Calculating Risk In this video, we will look into calculating risk while performing. Calculating Risk In this video, we will look into calculating risk while performing. In this video, we will look into calculating risk while performing. In this video, we will look into calculating risk while performing. Qualitative Risk Management We will discuss the qualitative risk measurement methods. Qualitative Risk Management We will discuss the qualitative risk measurement methods. Qualitative Risk Management We will discuss the qualitative risk measurement methods

Additional information

The course is for Information Technology mangers, Cyber-security managers, Aspiring managers

Risk Management for Cybersecurity and IT Managers

£ 100 + VAT