Data Security Training
Our Data security workshops and courses help your organisation to protect digital data from the malicious actions of unauthorized users, such as a cyberattack or a data breach.
Please select the course that you’re interested in
Please select the course that you are interested in
Data Security - CRISC Boot Camp (4-days)
Course Overview
- Domain 1 - IT Risk Identification
- Domain 2 - IT Risk Assessment
- Domain 3 - Risk Response and Mitigation
- Domain 4 - Risk and Control Monitoring and Reporting
Audience:
This four-day training targeted towards IT professionals, Risk professionals, Control professionals, Business analysts, Project managers, Compliance professionals enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them to become strategic partners to the enterprise. ISACA®’s Certified in Risk and Information Systems Control™ (CRISC™) certification instantly validates skills and expertise in risk and information systems control.
It proves ability to understand and articulate business risk, implement appropriate IS controls and develop effective plans to mitigate risk.
Prerequisite:
Basic understanding of IT security or IT security management is useful.
Duration:
This is a four-day CRISC Boot Camp. The course starts at 09:30 and runs until 16:30.
Alternate timings can be arranged upon request. The course can be held on a date that suits you.
Location:
Our CRISC Boot Camp will be delivered Online Remotely using online training platforms. It can also be run at our training venue near Liverpool Street (London) or any preferred location in the UK or Europe.
CRISC Boot Camp Course Outline
DOMAIN 1 – IT RISK IDENTIFICATIONCollect and review information, including existing documentation, regarding the organization’s internal and external business and IT environments Identify potential threats and vulnerabilities to the organization’s people, processes and technology to enable IT risk analysis. Develop a comprehensive set of IT risk scenarios based on available information. Identify key stakeholders for IT risk scenarios to help establish accountability. Establish an IT risk register to help ensure that identified IT risk scenarios are accounted for and incorporated into the enterprise-wide risk profile. To identify risk appetite and tolerance defined by senior leadership and key stakeholders to ensure alignment with business objectives. Collaborate in the development of a risk awareness program, and conduct training DOMAIN 2 – IT RISK ASSESSMENTAnalyze risk scenarios based on organizational criteria Identify the current state of existing controls and evaluate their effectiveness for IT risk mitigation. Review the results of risk and control analysis to assess any gaps between current and desired states of the IT risk environment. Ensure that risk ownership is assigned at the appropriate level to establish clear lines of accountability. Communicate the results of risk assessments to senior management and appropriate stakeholders. Update the risk register with the results of the risk assessment. | DOMAIN 3 – RISK RESPONSE AND MITIGATIONConsult with risk owners to select and align recommended risk responses with business objectives and enable informed risk decisions. Consult with, or assist, risk owners on the development of risk action plans. Consult on the design and implementation or adjustment of mitigating controls to ensure that the risk is managed to an acceptable level. Ensure that control ownership is assigned to establish clear lines of accountability. Assist control owners in developing control procedures and documentation. Update the risk register to reflect changes in risk and management’s risk response. Validate that risk responses have been executed according to the risk action plans. DOMAIN 4—RISK AND CONTROL MONITORING AND REPORTINGDefine and establish key risk indicators (KRIs) and thresholds based on available data, to enable monitoring of changes in risk. Monitor and analyze key risk indicators (KRIs) to identify changes or trends in the IT risk profile. Report on changes or trends related to the IT risk profile to assist management and relevant stakeholders in decision making. Facilitate the identification of metrics and key performance indicators (KPIs) to enable the measurement of control performance. Monitor and analyze key performance indicators (KPIs). Review the results of control assessments to determine the effectiveness of the control environment.
|
One to One
(which includes a tailor-made training programme for the individual where they can mix and match the topics from various levels to get the most cost-effective training
Group for up to 8 learners
What Our Clients Say
Extras
This is a sample of some of the Short training videos. Please note that you can get access to many more, once you have done a course with us and are registered as one of our delegates.