From the course: ISACA Certified in Risk and Information Systems Control (CRISC) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
IT risk scenarios
From the course: ISACA Certified in Risk and Information Systems Control (CRISC) Cert Prep
IT risk scenarios
- [Instructor] Now that we have information on the threats, the vulnerabilities, the impacts, the assets, we want to start building out IT risk scenarios. And these are as simple as a story. They should have attributes of a good story, like only details that are necessary, only details that matter, only things that are present that can help to drive the story forward. But by building out these risk scenarios, we can help get buy-in from stakeholders and better help people visualize the risk. In terms of times when risk scenarios are helpful and worth diving into this level of detail, it might be that you're looking for some sort of funding or resource inject related to controls or protections that you want to put in place. Maybe you need someone to manage your vulnerability program. You don't currently have that role, or someone's doing it more part-time than as a full-time job, and you want to come up with these scenarios…
Contents
-
-
-
-
-
Risk events and risk factors6m 54s
-
(Locked)
Methods to identify risk and potential changes8m 15s
-
(Locked)
Threats7m 35s
-
(Locked)
Vulnerability management8m 37s
-
(Locked)
IT risk scenarios7m 30s
-
(Locked)
Risk assessment techniques6m 19s
-
(Locked)
Risk ranking6m 36s
-
(Locked)
Risk and control ownership and accountability6m 59s
-
(Locked)
Risk register4m 3s
-
(Locked)
Inherent, residual, and current risk6m 4s
-
(Locked)
Important term differentiation3m 51s
-
-
-
-