Instructor for this course
more

This is a segment in our ongoing series on cyber risks.  This segment is the first in the series of segments that will address the procedures for preparing a cyber risk assessment.  For a cyber risk assessment, it is essential to establish a baseline for identifying critical components that must be evaluated. As in other courses, we will utilize the National Institute of Standards and Technology (NIST) Framework as a template to assist in discussing the concepts to be considered when performing a cyber risk assessment.

This segment takes a deep dive into the “identify” function required to properly perform a cyber risk assessment.  We evaluate the categories within the function of:

  • Asset management
  • Business environment
  • Governance
  • Risk assessment
  • Risk Management (RM) strategy
  • Supply chain risk management

 

Within each of these categories we examine specific objectives and procedures that should be considered in order to properly prepare your cyber risk assessment. Participants will come away with a deep understanding of the various processes required to properly identify cyber risks for their organization.

Learning Objectives

  • Explore the objectives of a cyber risk management assessment.
  • Explore critical concepts involved in preparing a cyber risk assessment for your organization.
  • Identify critical components of the identify function including objectives and procedures.
Last updated/reviewed: May 22, 2018

Included In Certifications

This course is included in the following Expert Certifications:

13 CoursesCorporate Cyber Security Certification

  1. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  2. A Primer on Cyber Security Programs and Roles
  3. Cyber Risk Management Frameworks and Concepts
  4. Cyber Risk Assessment - Identify Critical Assets
  5. Cyber Risk Assessment – Prioritize Assets for Protection
  6. Cyber Risk Assessment - Protect Assets from Threats
  7. Cyber Risk Assessment – Detect Threats Part One
  8. Cyber Risk Assessment – Detect Threats Part Two
  9. Cyber Risk Assessment – Respond to Incidents
  10. Cyber Risk Assessment – Recover from Incidents
  11. Measuring Cyber Risk Utilizing Tiers
  12. Personal Identity Theft
  13. The Business Identity Theft Crisis

3 Reviews (10 ratings)Reviews

5
Anonymous Author
The course provides valuable information to understanding the "Identify" phase of the Cyber Risk Assessment.
3
Member's Profile
Possibly longer than is required and consider reducing duration of this module.
5
Anonymous Author
I am ready to perform the Identity Function according to NIST

Prerequisites

Course Complexity: Intermediate

No Advanced Preparation or Prerequisites are needed for this course. However, it is recommended to take the other courses in the series prior to completing this one.

Education Provider Information

Company:
Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact:
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
INTRODUCTION AND OVERVIEW
  6:53Introduction to Cyber Risk Assessment: Identify
  17:18Cyber Risk Assessment
  14:52Business Environment Category
  7:13Governance Category
  10:31Risk Assessment Category
  6:00RM Strategy Category
  4:21SC RM
  1:55Summary
CONTINUOUS PLAY
  1:09:04Cyber Risk Assessment: Identify
Supporting Materials
  PDFSlides: Cyber Risk Assessment: Identify
  PDFCyber Risk Assessment: Identify Glossary/Index
REVIEW AND TEST
  quizREVIEW QUESTIONS
 examFINAL EXAM