The development of a risk response strategy is based on many factors including cost, culture, other projects, and available resources. You will first examine the factors that influence the risk response decision and how to ensure that the risk faced by the organization is within management defined limits. Next, you will cover the topics of inherent risk, data protection, and data encryption. Last, you will look at risk areas to consider in your organization. By the end of this course, you will be one step closer to being prepared for the ISACA CRISC certification examination.
Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.
Course Overview Hi everyone. My name is Kevin Henry, a security and risk consultant and a holder of the CRISC certification. I work in outreach as a Security Evangelist of Team Comery. Welcome to my course on risk response! This is the fourth course in a series that addresses the risk management process. This course examines the alternatives that management must consider in treating, or responding, to risk. This decision is based on the data provided in the previous step of risk assessment. Risk response must consider both legal and cultural factors to insure that, in the end, the organization faces an acceptable level of risk. These courses are an excellent overview of risk management and will also help you prepare for ISACA's CRISC, the certified risk and information systems control examination. The risk response decision must consider many factors in determining the best way to respond to, or treat, risk. This course continues our journey through the risk management framework through evaluating the decision making process used in risk treatment. Some of the major topics we will cover include the risk response alternatives, how to determine the best response, the calculation of residual risk, and updating the risk register. By the end of this course, you'll have an understanding of risk response and the way that risk treatment supports the overall process and goals of risk management. This is the fourth course in a series of five courses on risk management. I hope you'll join me for each one of them. From here, you should feel comfortable diving into the courses on Risk Monitoring. I hope you'll join me on this journey to learn about risk management with this risk response course at Pluralsight.