


#Risk: Conducting Cybersecurity Risk Assessments - Online Class - TBD
2 day instructor-led Conducting Security Risk Assessments class by best selling author Doug Landoll
Conducting Security Risk Assessments
Conducted properly, security risk assessments provide system owners with a risk-based decision making ability to properly implement cybersecurity programs. This includes a proper understanding of the threats to assets, vulnerabilities of current controls, and the selection of appropriate safeguards. Performed inaccurately or by winging it, these assessments provide a false sense of security and misapplied resources that ultimately lead to disastrous losses to data, capital, and corporate value.
Bases on the best practices, approaches, and techniques detailed in the 3rd Edition of The Security Risk Assessment Handbook: A Complete guide to Performing Security Risk Assessments this course gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently.
Course Objectives:
At the completion of this course attendees will be able to:
• Better negotiate the scope and rigor of security assessments,
• Effectively interface with security assessment teams,
• Effectively assess any security control (administrative, technical, or physical),
• Gain an improved understanding of final report recommendations, and
• Deliver insightful comments on draft reports.
This course covers all of the elements of conducting an information security risk assessment from the statement of work to the final report. Walking you through the process of conducting an effective security assessment, it provides the tools and up-to-date understanding you need to select the security measures best suited to your organization.
Course Materials
Course materials include course slides, handouts, and a copy of The Security Risk Assessment Handbook, 3rd Edition
2 day instructor-led Conducting Security Risk Assessments class by best selling author Doug Landoll
Conducting Security Risk Assessments
Conducted properly, security risk assessments provide system owners with a risk-based decision making ability to properly implement cybersecurity programs. This includes a proper understanding of the threats to assets, vulnerabilities of current controls, and the selection of appropriate safeguards. Performed inaccurately or by winging it, these assessments provide a false sense of security and misapplied resources that ultimately lead to disastrous losses to data, capital, and corporate value.
Bases on the best practices, approaches, and techniques detailed in the 3rd Edition of The Security Risk Assessment Handbook: A Complete guide to Performing Security Risk Assessments this course gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently.
Course Objectives:
At the completion of this course attendees will be able to:
• Better negotiate the scope and rigor of security assessments,
• Effectively interface with security assessment teams,
• Effectively assess any security control (administrative, technical, or physical),
• Gain an improved understanding of final report recommendations, and
• Deliver insightful comments on draft reports.
This course covers all of the elements of conducting an information security risk assessment from the statement of work to the final report. Walking you through the process of conducting an effective security assessment, it provides the tools and up-to-date understanding you need to select the security measures best suited to your organization.
Course Materials
Course materials include course slides, handouts, and a copy of The Security Risk Assessment Handbook, 3rd Edition
2 day instructor-led Conducting Security Risk Assessments class by best selling author Doug Landoll
Conducting Security Risk Assessments
Conducted properly, security risk assessments provide system owners with a risk-based decision making ability to properly implement cybersecurity programs. This includes a proper understanding of the threats to assets, vulnerabilities of current controls, and the selection of appropriate safeguards. Performed inaccurately or by winging it, these assessments provide a false sense of security and misapplied resources that ultimately lead to disastrous losses to data, capital, and corporate value.
Bases on the best practices, approaches, and techniques detailed in the 3rd Edition of The Security Risk Assessment Handbook: A Complete guide to Performing Security Risk Assessments this course gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently.
Course Objectives:
At the completion of this course attendees will be able to:
• Better negotiate the scope and rigor of security assessments,
• Effectively interface with security assessment teams,
• Effectively assess any security control (administrative, technical, or physical),
• Gain an improved understanding of final report recommendations, and
• Deliver insightful comments on draft reports.
This course covers all of the elements of conducting an information security risk assessment from the statement of work to the final report. Walking you through the process of conducting an effective security assessment, it provides the tools and up-to-date understanding you need to select the security measures best suited to your organization.
Course Materials
Course materials include course slides, handouts, and a copy of The Security Risk Assessment Handbook, 3rd Edition