6 hours 30 minutes
getting started with the main zero introduction to information security Risk. This is the domain that just make sure that we all have some of the basics down with risk management. We know a few of the key concepts, and then we want to kind of turn it around and related specifically to I t. So
we'll talk about information, security, risk
risk, governance versus risk management. Those air, sometimes terms that get used interchangeably, not interchangeable. Go through some definitions. We'll talk about risk management because that's where a lot of our focus is going to be. It's not gonna be so much on governance. It'll be on management.
Then we'll talk specifically about information security, and we'll talk about some of the threats to our information. Some of the vulnerabilities and then the corresponding risks will look a TTE ai Saca's risk management life cycle. And since I Sacha is the organization that puts out the sea risk exam,
you can imagine that I saca's see risk
risk management life cycle that that's gonna be on the sea risk exam. And then, of course, we'll wrap up and do a review.
So getting started with an introduction to risk. We want to make sure we have a couple of important terms. So first of all, a risk is an unknown,
and the value of the risk is a combination of probability and impact. How likely somethingto happen? And if it does happen, what's the consequence? So when you have low probability, low impact risks, you don't have a huge potential for loss, right? You don't have a huge risk value,
but for those events that really likely to happen and have a huge impact,
you got a problem. And that's going to drive. Of course, you're mitigation strategies.
All right, So since a risk is unknown once that risk event materializes, it's now an incident. So risks are always unknown. Once they happen, they're no longer unknown. Right?
we will always talk in this course about risk as an adverse event. However, there some documents and some courses that teach risks as being positive and negative. A positive risk is an opportunity, and negative risk is a threat.
I kind of get that, especially when you're doing, like, estimation of costs and those things. But for this class, we're gonna look at risk sous negatives. I don't ever hear anybody say, Ooh, there's a risk I'm gonna win the lottery, right? That's that's not what we think about with risks.
All right, So when I'm developing or evaluating rather risks there a couple of things that have to be considered, actually there a zillion things that have to be considered. But these are the ones we're gonna focus on first.
First of all, the organization We want our risk management strategy to be aligned with the mission of the organization. So if the organization is very conservative than we're gonna have a conservative strategy towards risk,
If the organization's very aggressive and very much fueled by venture capital and let's get out there and try it,
then my risk strategy should reflect that. So always we're gonna be in alignment with the mission of the organization
assets, threats, vulnerabilities, assets. What I value
threats would cause harm to the asset vulnerabilities or weaknesses. So when we talk about the risk triad, your assets,
the threats that would harm them and the vulnerabilities that would allow the at exploit as a matter of fact, if you look at the bottom bullet point, a risk equals asset times threat times probability. So you have to have all three of those toe have a risk if you don't have an asset and you don't have a risk. If you don't have a threat, no risk.
There's It's impossible the risk would happen.
No risk, right or the event would happen
now. Likelihood. An impact. Like I said, that's gonna be the the two elements that we used to determine the value of a list of a risk. There's an 80% chance I'm gonna lose $10,000 while my potential for losses. 8000 right? I've got an $8000 risk.
So we're gonna use that when we're trying to figure out how much risk we have,
and then what would be what would make sense to mitigate those risks? We need that value
IoT Product Security
This course will focus on the fundamentals of how to set up a functioning IoT ...
8 CEU/CPE Hours Available
Certificate of Completion Offered
50 CISO Security Controls
Dr. Edward G. Amoroso, CEO of TAG Cyber and former CISO of AT&T, covers six ...