Cyber Risk Assessment Training
Identify and protect your critical assets by performing your own risk assessments
Option 1-Face-to-Face Training
In this two-day course, participants learn to perform information security risk assessments. Our approach provides organisations with a comprehensive methodology that focuses on information assets in their operational context. You will use the latest electronic risk management tool throughout the course.
Throughout the course, you will participate in in-class exercises and discussions, including activities for risk identification, analysis, and response.
After completing the course, attendees will be able to:
Gather and organise risk information via interviews, documentation reviews, and technical analysis
Create risk evaluation criteria
Identify, analyse and prioritise information security risks.
Improve vulnerability management activities by viewing them in a risk context
Understand why managing operational risk is important to managing enterprise risk
Develop risk response strategies appropriate for the organisation's business requirements
By focusing on operational risks to information assets, participants learn to view risk assessment in the context of the organisation's strategic objectives and risk tolerances.
Option 2-Cyber Risk Assessment Online Training
The advantage of the online training is that you can stop at each step, go and implement or research what you need before progressing to the next step. This method means by the end of the course; you will have completed your Cyber Risk Assessment on your organisation.
There are nine modules in this course and cover the Eight Steps in Conducting a Cyber Risk Assessment.
Comes complete with all templates and training on how you conduct a Cyber Risk Assessment as per the Software Engineers Institute recommendations.
The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro™ method developed by the Carnegie Mellon University, Pittsburgh USA.
The OCTAVE Allegro™ approach provides the Public and Private Sectors a comprehensive methodology that focuses on information assets in their operational context. Cyber risks are identified and analysed based on where they originate, at the points where information is stored, transported, and processed. By focusing on operational risks to information assets, participants learn to view risk assessment in the context of the Public and Private Sectors strategic objectives and risk tolerances.
Who should do the course?
Individuals who want to be able to perform their own in house risk assessments
C-Suite, Security professionals, business continuity planners, compliance personnel, risk managers and others
Personnel need to perform a formal risk assessment to satisfy PCI-DSS requirements
Information Technology technicians that want to increase their knowledge on cybersecurity