Security Risks: Planning for Security Risk Management

IT Security    |    Beginner
  • 12 videos | 1h 26m 28s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 64 users Rating 4.4 of 64 users (64)
Highly effective security leaders recognize that they must prioritize and focus their efforts on managing critical security risks. Therefore, once a security risk is identified, it must be carefully evaluated. In this course, you'll identify the activities involved in a risk management process, the importance of risk strategies in the context of work environments, and essential decisions required for managing security risks effectively. Moving on, you'll investigate the components of a risk management plan and how to improve a risk management strategy by increasing risk tolerance and risk appetite. You'll also outline the importance of mitigation plans and discover how to create one in Microsoft Word. Lastly, you'll recognize the role of risk monitoring and control measures in risk management planning and the factors that shape an organization's approach to making decisions in handling risks.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the purpose of risk management and list the best practices
    Outline the stages and activities in a risk management process
    Identify the components of a risk management plan and recognize different risk categories
    List the elements of a risk management plan and the steps involved in creating one
    Describe the features of a risk mitigation plan and its role in risk management
  • Create a risk mitigation plan in microsoft word
    Outline the factors that influence risk tolerance and risk appetite and the differences between them
    Examine the concept of risk monitoring and control measures and list their outcomes in risk management planning
    Recognize the importance of treating risks and list different risk strategy methods
    Describe the role of decision making in managing risks
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 47s
    In this video, you'll learn more about your instructor and the course. In this course, you’ll learn about the risk management process and the activities involved in it. You’ll also learn about risk strategies in the context of the work environment. You’ll learn about key decisions you should make for managing security risks. And you’ll learn more about risk management plans. FREE ACCESS
  • 15m 51s
    In this video, you’ll learn more about risk. You’ll also learn you must manage risk in order to protect assets. You’ll find that managing risks can protect an organization from legal liability and protect customers’ confidence. You’ll look at specific examples of risk management and learn more about best practices. FREE ACCESS
  • Locked
    3.  Stages in a Security Risk Management Process
    13m
    In this video, you’ll learn more about risk management. You’ll discover the risk management process itself involves several activities. You’ll learn the process starts with setting up the context. Then you’ll learn about risk identification, risk assessment, risk treatment, and the creation of a risk management plan. Finally, you’ll learn how to implement methods to mitigate risks and review the risk management plan. FREE ACCESS
  • Locked
    4.  Security Risk Management Plan and Risk Categories
    8m 49s
    In this video, you’ll learn more about the risk management plan. You’ll learn it contains information about risks along with a schedule for control implementation as well as the names of those who will be responsible for implementing these controls. You’ll learn that a risk management plan helps define potential risks, their impacts, their probability, and their responses. FREE ACCESS
  • Locked
    5.  Components of a Security Risk Management Plan
    8m 22s
    In this video, you’ll learn more about the components of a risk management plan. These components include methodologies, roles, responsibilities, budgeting, and timing. You’ll also learn more about reporting format, tracking, and risk categories. You’ll learn that methodology refers to the way you plan to execute the risk management plan. This includes the methods used during risk identification and analysis and the kind of tools you’ll use to find the sources of risk information. FREE ACCESS
  • Locked
    6.  Features of a Security Risk Mitigation Plan
    4m 55s
    In this video, you’ll learn more about a risk mitigation plan. You’ll learn this is a document that contains the procedures for managing risks across the project lifecycle or within the organization. It contains the identification and quantification of a risk as well as the roles and responsibilities of those who are responsible for managing risks. You’ll discover this plan also contains a contingency plan that will be implemented. FREE ACCESS
  • Locked
    7.  Creating a Risk Mitigation Plan in Microsoft Word
    3m 12s
    In this video, you’ll watch a demo. In this demo, you’ll take a look at a risk mitigation plan. You’ll follow along onscreen where two risks have been identified. You’ll walk through two examples of risk. Then, you’ll discuss building a risk mitigation plan. FREE ACCESS
  • Locked
    8.  Risk Tolerance and Risk Appetite
    9m 52s
    In this video, you’ll learn more about risk appetite. You’ll learn risk appetite is the amount of risk an organization is willing to accept in order to meet its business objectives. Then, you’ll learn more about risk tolerance, which is the amount of risk an organization is willing to take. Finally, you’ll discuss risk capacity, which is the maximum level of risk that an organization can handle. FREE ACCESS
  • Locked
    9.  Security Risk Monitoring and Control Measures
    5m 56s
    In this video, you’ll learn more about risk monitoring. Risk monitoring helps you measure the risks that have planned responses. You’ll learn that risk monitoring also helps you create workarounds for risks that are not identified. You’ll discover risk monitoring can help you meet specific objectives, as well. It can help you develop workaround plans and corrective actions. FREE ACCESS
  • Locked
    10.  Security Risk Strategies Methods
    9m 11s
    In this video, you’ll learn more about risk strategies. Risk strategies are the methods of treating risks. You’ll learn risks can be treated in different ways. You can simply adopt the risk or accept it, or you can avoid it or transfer it. You’ll discover that once you have chosen a risk strategy, you need to do a cost and benefit analysis. FREE ACCESS
  • Locked
    11.  Role of Decision Making in Managing Security Risks
    4m 3s
    In this video, you’ll learn more about the decisions you need to make to manage risks. You’ll learn these decisions will define the outcome of the risks, meaning whether the risk can occur or not. You’ll learn about these key decisions. To make decisions, you’ll need to define countermeasures and the risks you’ll need to handle. Then, you can decide which risk treatment method to use. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 30s
    In this video, you’ll summarize what you’ve learned in the course. In this course, you’ve learned the basic concepts of risk management. You learned about risk management plans, details of a risk management plan, and risk mitigation plans. You also looked at examples of risk, increasing risk tolerance and risk appetite, risk monitoring and control measures. And finally, you learned the key decisions in managing risks. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 383 users Rating 4.6 of 383 users (383)
Rating 4.6 of 275 users Rating 4.6 of 275 users (275)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 242 users Rating 4.7 of 242 users (242)
Rating 4.4 of 519 users Rating 4.4 of 519 users (519)
Rating 4.7 of 66 users Rating 4.7 of 66 users (66)