Mitigating Security Risks: Managing Risks from Internal Stakeholders

IT Security    |    Intermediate
  • 7 videos | 49m 34s
  • Includes Assessment
  • Earns a Badge
Rating 4.1 of 21 users Rating 4.1 of 21 users (21)
Effective risk management involves managing risks from external as well as internal sources. Because security risks can be introduced through internal stakeholder decisions, working with them to build awareness of the broad spectrum of security risks and their role in mitigating these is essential. In this course, you'll explore the internal stakeholder's role in the security landscape context. You'll then investigate how to effectively communicate with stakeholders regarding their role in preventing security risks from being introduced. You'll build on these concepts by examining best practices for continual stakeholder engagement using workplace example scenarios. You'll then outline various methods of effective security health reporting. At the end of this course, you'll be able to plan for effective stakeholder communication and engagement.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define the role of internal stakeholders in the context of security
    Identify the security risks that can come from decisions taken by stakeholders
    Describe the role of effective communication and stakeholder engagement in managing security risks from internal stakeholders
  • Describe the methods used in effective reporting of security health
    Illustrate through a security-related work example scenario how effective stakeholder communication and engagement can result in a more secure workplace
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 33s
    In this video, you’ll learn more about your instructor and the course. In this course, you’ll learn about internal stakeholders and the role of effective communication with them in context of security risks. You'll also learn about best practices for stakeholder management. You will also discover various methods of effective reporting when it comes to security health. FREE ACCESS
  • 7m 19s
    In this video, you’ll learn more about two different types of stakeholders. This includes external stakeholders and internal stakeholders. Now when you talk about external stakeholders, this could be vendors or a third party who is not directly involved in the project strategy or the organization. Internal stakeholders are those within the organization affected by a specific decision.  FREE ACCESS
  • Locked
    3.  Security Risks from Stakeholders
    7m 1s
    In this video, you’ll learn more about the security decisions by internal stakeholders. You’ll learn that not all stakeholders are involved in security related decisions. You’ll learn that internal stakeholders are those who can influence security related decisions. You’ll discover there are different entities involved in security related decisions. FREE ACCESS
  • Locked
    4.  The Role of Effective Communication in Security
    14m 3s
    In this video, you’ll learn more about the importance of effective communication in our interactions with the stakeholders. You’ll talk about different types of communication, including verbal, non-verbal, and written. You’ll also learn effective listening techniques. You’ll learn that when you are part of a security team, you’ll be discovering a lot of incidents, and you’ll be preparing different kinds of reports. You’ll be creating incident response plans, disaster recovery plans, and business continuity plans. FREE ACCESS
  • Locked
    5.  Methods in Effective Reporting of Security Health
    11m 58s
    In this video, you’ll learn more about effective methods of reporting security health. You’ll learn reporting is the method you’ll use to inform superiors of tasks. This could be in the form of an email or verbal communication. You’ll learn effective reporting means providing accurate information to stakeholders and decision-makers. Effective reporting includes reporting to the person who assigned you the task. You’ll need to provide actual data once a particular task is completed. FREE ACCESS
  • Locked
    6.  Communication for a Secure Workplace
    6m 30s
    In this video, you’ll learn more about the secure workplace. You’ll look at a specific example in this video that includes installing a VPN server that remote workers can access. FREE ACCESS
  • Locked
    7.  Course Summary
    1m 11s
    In this video, you’ll review what you learned in this course. In this course, you learned about the role of internal stakeholders, security risks from stakeholders, the role of effective communication, and methods in reporting. You also learned about effective user communication and communication for a secure workplace. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 275 users Rating 4.6 of 275 users (275)
Rating 4.3 of 7 users Rating 4.3 of 7 users (7)
Rating 4.6 of 68 users Rating 4.6 of 68 users (68)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 193 users Rating 4.5 of 193 users (193)
Rating 4.4 of 64 users Rating 4.4 of 64 users (64)
Rating 4.3 of 58 users Rating 4.3 of 58 users (58)