Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
CISM Domain 2 - Information risk management (IRM)
#1
Video 
[Image: 301591965833a3c9b74c6f83dcee6c47.jpeg]
Free Download CISM Domain 2 - Information risk management (IRM)
Published 5/2024
Duration: 5h23m | Video: .MP4, 1920x1080 30 fps | Audio: AAC, 48 kHz, 2ch | Size: 3.33 GB
Genre: eLearning | Language: English
CISM Domain 2 - Information risk management (IRM) Video Course and Downloadable Flashcards

What you'll learn
Identify and evaluate information risks within an organization.
Develop comprehensive risk management plans that align with business goals.
Monitor and report on risk status and control effectiveness.
Ensure compliance with regulatory and legal requirements related to information security.
Requirements
Basic understanding of information security principles.
Familiarity with organizational processes and IT systems.
Description
This course delves into the principles and practices of Information Risk Management (IRM), a critical domain in the Certified Information Security Manager (CISM) certification. It covers the methodologies and processes used to identify, evaluate, and manage risks to an organization's information assets. Students will learn to develop and implement risk management strategies to protect these assets, ensuring alignment with business objectives and regulatory requirements.
Course Objectives
Understand the fundamentals of information risk management and its importance in an organization.
Identify and assess information risks using various risk assessment techniques.
Develop and implement effective risk mitigation strategies.
Integrate risk management practices into organizational processes and decision-making.
Ensure compliance with relevant legal, regulatory, and contractual requirements.
Key Topics
Risk Identification
Techniques for identifying risks to information assets.
Understanding threats, vulnerabilities, and potential impacts.
Risk Assessment
Qualitative and quantitative risk assessment methodologies.
Risk analysis tools and techniques.
Prioritizing risks based on business impact and likelihood.
Risk Response and Mitigation
Strategies for risk avoidance, transfer, acceptance, and mitigation.
Designing and implementing controls to reduce risk.
Developing risk response plans and contingency planning.
Risk and Control Monitoring and Reporting
Continuous monitoring of risk environment and controls effectiveness.
Risk metrics and Key Risk Indicators (KRIs).
Reporting risk status to stakeholders and senior management.
Compliance and Regulatory
Requirements
Understanding relevant laws, regulations, and standards (e.g., GDPR, HIPAA).
Ensuring organizational policies and practices meet compliance requirements.
Auditing and assurance activities to validate compliance.
Risk Management Frameworks and Standards
Overview of widely-used risk management frameworks (e.g., ISO 31000, NIST).
Implementing a risk management program aligned with best practices and industry standards.
Who this course is for
This course is designed for professionals who are involved in managing and overseeing information security and risk management within an organization.
Homepage

[To see links please register or login]









Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live

[To see links please register or login]

No Password - Links are Interchangeable
[Image: signature.png]
Reply



Forum Jump:


Users browsing this thread:
2 Guest(s)

Download Now   Download Now
Download Now   Download Now