Cyber Security Risk Assessment Training

Course 2013

  • Duration: 4 days
  • Language: English
  • 23 CompTIA CEUs
  • 23 NASBA CPE Credits (live, in-class training only)
  • Level: Foundation
Get This Course $2,990
  • 4-day instructor-led training course
  • Learning Tree end-of-course exam included

  • One-on-one after-course instructor coaching
  • Nov 7 - 10 9:00 AM - 4:30 PM EST
    Herndon, VA or Virtual
  • Dec 6 - 9 9:00 AM - 4:30 PM MST
    Aurora or Virtual
  • Jan 17 - 20 9:00 AM - 4:30 PM EST
    Herndon, VA or Virtual
  • Mar 7 - 10 9:00 AM - 4:30 PM EST
    Toronto or Virtual
  • May 9 - 12 9:00 AM - 4:30 PM EDT
    New York or Virtual
  • Jun 6 - 9 9:00 AM - 4:30 PM MDT
    Aurora or Virtual
  • Jul 18 - 21 9:00 AM - 4:30 PM EDT
    Herndon, VA or Virtual
  • Sep 5 - 8 9:00 AM - 4:30 PM EDT
    Toronto or Virtual

Scroll to view additional course dates

This Cybersecurity Risk Assessment and Management course will teach you how to conduct a security risk assessment to protect your organization. You will learn about the laws and regulations that impose strict cybersecurity requirements on all organizations and gain the skills to develop a compliance assessment plan and employ a standards-based risk management process while maintaining a satisfactory security posture.

Attendees should have a basic knowledge of business processes and technology concepts. No specialized technical knowledge is assumed.

Cybersecurity Risk Assessment & Management Training Delivery Methods

  • In-Person

  • Online

Cybersecurity Risk Assessment & Management Training Information

In this Risk Assessment training, you will learn how to:

  • Implement standards-based, proven methodologies for assessing and managing the risks to your organization's information infrastructure.
  • Select and implement security controls that ensure compliance with applicable laws, regulations, policies, and directives.
  • Extend security protection to Industrial Control Systems (ICS) and the cloud.

Cyber Security Risk Assessment & Management Course Outline

  • Ensuring compliance with applicable regulatory drivers
  • Protecting the organization from unacceptable losses
  • Describing the Risk Management Framework (RMF)
  • Applying NIST/ISO risk management processes

Defining the system

  • Outlining the system security boundary
  • Pinpointing system interconnections
  • Incorporating the unique characteristics of Industrial Control Systems (ICS) and cloud-based systems

Identifying security risk components

  • Estimating the impact of compromises to confidentiality, integrity and availability
  • Adopting the appropriate model for categorizing system risk

Setting the stage for successful risk management

  • Documenting critical risk assessment and management decisions in the System Security Plan (SSP)
  • Appointing qualified individuals to risk governance roles

Assigning a security control baseline

  • Investigating security control families
  • Determining the baseline from system security risk

Tailoring the baseline to fit the system

  • Examining the structure of security controls, enhancements and parameters
  • Binding control overlays to the selected baseline
  • Gauging the need for enhanced assurance
  • Distinguishing system-specific, compensating and non-applicable controls

Specifying the implementation approach

  • Maximizing security effectiveness by "building in" security
  • Reducing residual risk in legacy systems via "bolt-on" security elements

Applying NIST/ISO controls

  • Enhancing system robustness through selection of evaluated and validated components
  • Coordinating implementation approaches to administrative, operational and technical controls
  • Providing evidence of compliance through supporting artifacts

Developing an assessment plan

  • Prioritizing depth of control assessment
  • Optimizing validation through sequencing and consolidation
  • Verifying compliance through tests, interviews and examinations

Formulating an authorization recommendation

  • Evaluating overall system security risk
  • Mitigating residual risks
  • Publishing the Plan of Action and Milestones (POA&M), the risk assessment and recommendation

Aligning authority and responsibility

  • Quantifying organizational risk tolerance
  • Elevating authorization decisions in high-risk scenarios

Forming a risk-based decision

  • Appraising system operational impact
  • Weighing residual risk against operational utility
  • Issuing Authority to Operate (ATO)

Justifying continuous reauthorization

  • Measuring impact of changes on system security posture
  • Executing effective configuration management
  • Performing periodic control reassessment

Preserving an acceptable security posture

  • Delivering initial and routine follow-up security awareness training
  • Collecting on-going security metrics
  • Implementing vulnerability management, incident response and business continuity processes

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

Cybersecurity Risk Assessment & Management Training FAQs

Going through the process of identifying, analyzing and evaluating risk. It helps to guarantee that the cybersecurity controls you are choosing are suitable for the risks your organization may face.

Information security risk management is the process of managing risks associated with the use of information technology.

Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.

Chat With Us