From the course: ISACA Certified in Risk and Information Systems Control (CRISC) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Risk assessment techniques
From the course: ISACA Certified in Risk and Information Systems Control (CRISC) Cert Prep
Risk assessment techniques
- [Instructor] Next, we're going to talk about risk assessment techniques. There are many different risk assessment techniques to choose from, and we're going to list a couple, and if you went out in the industry or looked at the ISACA materials, you'd see that there's 15, 20. I'm sure there's always a new risk assessment technique coming out to from the industry, but you want to take a look at what's best for your organization. I also want you to consider that longevity can help with consistency over time. So for example, you may be looking at your technology risks today, and you may say, "Yes, this specific quantitative method is the best method that we want to pick, and it's the one that we definitely want." However, if in 18 months you've built this risk assessment method to be specific to only one type of risk, or only to your security and technology risk and not the rest of the risks in your organization,…
Contents
-
-
-
-
-
Risk events and risk factors6m 54s
-
(Locked)
Methods to identify risk and potential changes8m 15s
-
(Locked)
Threats7m 35s
-
(Locked)
Vulnerability management8m 37s
-
(Locked)
IT risk scenarios7m 30s
-
(Locked)
Risk assessment techniques6m 19s
-
(Locked)
Risk ranking6m 36s
-
(Locked)
Risk and control ownership and accountability6m 59s
-
(Locked)
Risk register4m 3s
-
(Locked)
Inherent, residual, and current risk6m 4s
-
(Locked)
Important term differentiation3m 51s
-
-
-
-