From the course: Complete Guide to Open Source Security
Unlock the full course today
Join today to access over 24,500 courses taught by industry experts.
Introduction to GRC
From the course: Complete Guide to Open Source Security
Introduction to GRC
- [Instructor] A significant part of any cybersecurity program falls into the category of what's commonly referred to as governance, risk and controls, or GRC. The key activities here are developing strategies and plans to manage the cybersecurity program and monitoring to ensure compliance with the policies and reporting to enable assessment of the program's effectiveness. Architecting, designing, and managing the security of the technology assets that support the business in such a way to ensure security also supports the business. Managing the cybersecurity process is required to deliver an effective cybersecurity program. Managing cybersecurity risk through risk assessments and mitigation of risks that exceed our risk appetite And the creation of a control framework that can be used in the form of security services to mitigate risk. And assessments and audits of control effectiveness. Much of the GRC work is documentary, however, there are some useful open source systems which we…
Contents
-
-
-
-
(Locked)
Introduction to GRC1m 13s
-
Architecting with ArchiMate5m 52s
-
(Locked)
Modelling security with Archi2m 22s
-
(Locked)
Adding security to the model3m 27s
-
(Locked)
Security risk management with SimpleRisk3m 9s
-
(Locked)
Taking SimpleRisk for a spin7m 34s
-
(Locked)
Using eramba for GRC4m 18s
-
(Locked)
Configuring the eramba system8m 31s
-
(Locked)
Preparing your risk context9m 11s
-
(Locked)
Setting up your assets3m 15s
-
(Locked)
Entering risks into eramba3m 35s
-
(Locked)
-
-
-
-
-
-
-
-
-
-
-
-