Author
Updated
6/2/2020Released
2/28/2017- Name the goals of information security.
- Cite the benefits of risk management.
- Describe the essential functions of an information security program.
- Summarize how to define your role in an information security program.
- Explain the importance of a plan to measure information risks.
- Recognize how questions drive the development of an information security program.
- Identify ways to generate ideas to manage top risks.
- Describe the audit function.
Skill Level Intermediate
Duration
Views
- The annual world wide cost of cybercrime will reach six trillion dollars by 2021 according research firm, Cybersecurity Ventures. That's double the three trillion dollars it cost everyone in 2015. Many people in charge of defending against cyber attacks often struggle to clarify their priorities and organize themselves. They can feel alone and outgunned. I'm Kip Boyle. I'm the founder and CEO of Cyber Risk Opportunities and I specialize in providing managed cybersecurity programs to mid-sized organizations. In this course, I'll teach you a practical, managerial approach to building and operating your information security program. I'll show you a way that will be data driven and biased towards action. I know the approach works because I've already used it with a wide range of organizations, from a two million dollar non-profit agency to a billion dollar multi-national firm. So if you want to stay ahead of the cyber criminals, you've come to the right place. Let's get going.
Related Courses
-
Creating Your IT Strategy
with Peter High45m 51s Advanced -
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Intermediate
-
Introduction
-
Cybersecurity overview1m 56s
-
Cyber resilience overview4m 19s
-
Risk management overview3m 48s
-
1. Information Security Program Goals
-
2. Information Security Program Components
-
Determine your role4m 46s
-
Build a team5m 35s
-
The need for management2m 14s
-
The need for leadership4m 53s
-
3. Structure an Information Security Program
-
Sources of controls6m 20s
-
-
4. Measure Information Risks
-
Understand the 0 to 10 scale3m 30s
-
5. Understand Information Risks
-
The questions that drive us1m 47s
-
Determine resilience2m 13s
-
Determine the top five risks2m 16s
-
-
6. Manage Information Risks
-
Estimate costs3m 7s
-
Estimate benefits4m 39s
-
Prepare proposals3m 25s
-
7. Demonstrate Compliance and Progress
-
Communicate with executives3m 31s
-
Communicate with auditors3m 33s
-
-
8. Use a Workflow to Organize Work
-
Conclusion
-
Next steps1m 3s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Protect against cyber attacks