Instructor for this course

Cyber risk is one of the top business risks today.  Information technology continues to evolve and cyber risk continues to escalate.  It is important that all individuals understand the basics of cyber risk and threats.  In addition, organizations must learn to develop effective cyber risk programs and appropriately measure cyber risk. This course is complementary the other Cyber Risk courses this presenter has prepared.

As discussed in the segment on cyber risk management frameworks, multiple risk management frameworks exist and can be effectively utilized by organizations to establish their cyber programs.  These learning segments utilize the NIST Framework (National Institute of Standards and Technology (NIST) established by executive order in February 2013) as a template for assisting in understanding the various components that should be assessed related to cyber risk. Separate segments delved into the specifics around performing a Cyber Risk Assessment (RA) and the “identify” function. This function assists organizations in knowing what assets may be at risk for a cyber-attack/cyber breach. Once assets are identified, the NIST framework suggests organizations then protect those assets.

In order to right-size your cyber security efforts, organizations must develop a process to properly prioritize their assets and apply cost balanced mitigation controls. This segment will evaluate various methods to assign priorities to identified assets.

Learning Objectives

  • Explore how identification of assets ties to prioritization.
  • Identify high level methods to prioritize risks.
  • Explore how to prioritize using the criticality concept.
  • Explore the use of impacts in assigning priorities.
  • Explore the use of likelihood applied to assigned impact in assigning priority.
  • Explore using criticality components combined with impact and likelihood to assess residual risk. 
Last updated/reviewed: October 7, 2018

Included In Certifications

This course is included in the following Certification Programs:

13 CoursesCorporate Cyber Security Certification

  1. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  2. A Primer on Cyber Security Programs and Roles
  3. Cyber Risk Management Frameworks and Concepts
  4. Cyber Risk Assessment - Identify Critical Assets
  5. Cyber Risk Assessment – Prioritize Assets for Protection
  6. Cyber Risk Assessment - Protect Assets from Threats
  7. Cyber Risk Assessment – Detect Threats Part One
  8. Cyber Risk Assessment – Detect Threats Part Two
  9. Cyber Risk Assessment – Respond to Incidents
  10. Cyber Risk Assessment – Recover from Incidents
  11. Measuring Cyber Risk Utilizing Tiers
  12. Personal Identity Theft
  13. The Business Identity Theft Crisis

2 Reviews (13 ratings)Reviews

Anonymous Author
Prioritizing assets was an informative and thought out course. I will utilized the ideas presented in this course
Anonymous Author
The course was good. It definitely met the learning objectives.


Course Complexity: Intermediate

No Advanced Preparation or Prerequisites are needed for this course. However, it is recommended to take the other courses in the series prior to completing this one.

Education Provider Information

Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
  3:26Introduction to Cyber Risk Assessment – Prioritize Assets for Protection
  6:59Identify Critical Assets
  16:09Prioritize with Criticality
  9:52Prioritize Further Utilizing Impacts
  9:36Prioritize Further Utilizing Impacts Continued..
  2:30Applying Likelihood to Impact
  10:30Integrating Priority with Impact/Likelihood
  10:07Integrating Priority with Impact:Likelihood Continued & Summary
  1:15:47Cyber Risk Assessment – Prioritize Assets for Protection
  PDFSlides: Cyber Risk Assessment – Prioritize Assets for Protection
  PDFCyber Risk Assessment – Prioritize Assets for Protection Glossary/Index