Managing risk is a highly critical skill in today's organizations. This course will demonstrate the advanced skills you need to prepare your organization to effectively manage risk using the ISACA Risk IT Framework.
In today’s IT networks, risk is a critical element in balancing the ever-increasing threat of data breaches, lack of resources, and the need to ensure that IT supports business functions. Add complex compliance requirements from today’s regulatory environment, and the need for IT risk management is both obvious and urgent. Managing this risk focuses on three critical processes in the organization: governance, risk evaluation and analysis, and risk response. Organizations must have a solid framework in place to guide their cyber risk management efforts. In this course, Implementing and Performing Risk Management with ISACA’s Risk IT Framework, you'll gain your key to getting the practical knowledge you need to have to implement that framework. First, you’ll learn what the ISACA Risk IT Framework is and how it can be used to manage risk in your organization. Next, you’ll also learn how the Risk IT Framework articulates with COBIT and Val IT. This course will also show you how to implement the three domains of the framework, including Governance, Evaluation, and Response. Finally, you’ll learn how to implement and integrate the Risk IT Framework into your organization’s risk management strategy and processes. By the end of this course, you’ll have the advanced knowledge you need to help you manage the cyber risk program in your organization.
Bobby E. Rogers is an information security engineer working as a contractor for Department of Defense agencies, helping to secure, certify, and accredit their information systems. His duties include information system security engineering, risk management, and certification and accreditation efforts.
Course Overview [Autogenerated] Hi, everyone. My name is Bobby Rogers and welcome to the implementing and performing risk management with a saca's risk i t. Framework. Of course, I'm a cyber security analyst, and I worked as a contractor securing information systems and data for the US government specializing in cyber risk management. Do you need to manage? I t risk in your company, but you don't know where to begin. If you need to integrate, I t risk management with business risk management, Saca's Risk I t. Framework. Maybe just where you need to start. That's why we've produced this course that covers how the risk I t framework can help you manage cyber risk from the top down and integrated into your organization's business strategy and risk. We're going to discuss and demonstrate the key processes you need to perform to effectively manage IittIe and business risk. Using the risk I t. Framework. Some of the major topics that we will cover include risk, tolerance, appetite and culture, the interactions between I T and business risk risk, governance, evaluation and response, and how to implement the framework in your organization. By the end of this course, you'll understand how to adopt the risk i t. Framework to manage the interaction between business and I t risk and create a top down risk management program before beginning the course. You should be familiar with basic risk concepts, the fundamentals of risk management and security management processes. I hope you join me on this journey to learn about i t risk management with the implementing and performing risk management with a ____ is risk i t framework course from poolside.