CRISC

Course
Time
6 hours 30 minutes
Difficulty
Advanced
CEU/CPE
7

Video Transcription

00:02
now I, Sacha, provides us with some guidance on how to incorporate risk management into the world of technology, and they do so through the risk I t framework. And then also we can apply the risk management lifecycle as we move forward.
00:19
So the risk anti framework, first of all,
00:22
is of course, geared towards I t. Specifically, and the idea is that we should be able to take a look at where we are currently. Take a look where we want to be an ultimately be able to close the gap.
00:38
So this is a document you can download for my Saca's website has a lot of good information.
00:44
May not be a bad idea to read through I. Saca's Risk I t framework before taking the sea risk exam. If you look it up on Google, you'll definitely be able to find that. And it's certainly worth going through and looking at some of the strategies that are mentioned.
01:00
So the idea is
01:03
that we evaluate our environment based on governance, how we analyze risks or evaluate risks, and then how we respond to risk. So we have risked governance risk evaluation risk response are G R e R R
01:19
So where organization is, we could be at RG one for governance. RG two or where we wanna be is RG three.
01:29
So, ultimately, within the framework, you'll find descriptors of each level, and it's up to you to determine where we are versus where we want to be. Obviously, we want to be in the three column because with risk evaluation,
01:44
we collect that at Ari one. Well, that doesn't help us. We're gonna be ableto analyze the risk from the data.
01:49
And then we want to make sure that we can control our risk profile.
01:55
So that's just a little bit. You may see question on what RG two of the risk manager of the
02:02
I t risk framework Risk I t. Framework
02:07
Governance Evaluation. In response
02:10
Now I Saca's life cycle for risk management.
02:15
And this is how the domains of sea risk are organized. They're organized by lifecycle stage, So we have I t risk identification.
02:25
We identify risks specifically by looking at our assets are threats and vulnerabilities. Okay, that's risk identification risk assessment. We want a sign of value to the risk events. Value could be qualitative. Using words like high medium low or can be quantitative
02:45
numeric data. Empirical data,
02:49
then, based on the value of the potential risk we mitigate the degree of mitigation we need is dependent on the mount of risk and making sure that we have a cost effective solution
03:02
after we implement our response. Then, of course, we go forward and we continue to monitor and control. There's risk responses until we find that it's time to go back and revisit risks and identify from scratch. Usually we go back and revisit this once per year or in the event of a major change.

Up Next

CRISC

This course on Certified in Risk and Information Systems Control is for IT and business professionals who develop and maintain information system controls, and whose job revolves around security operations and compliance.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor