Companies Home Search Profile

IT and Cybersecurity Risk Management Essential Training

Focused View

Kip Boyle

1:38:22

193 View
  • 001. Managing risk in IT.mp4
    01:17
  • 002. What is IT risk.mp4
    04:38
  • 003. What is IT risk appetite.mp4
    02:32
  • 004. What is IT risk tolerance.mp4
    03:04
  • 005. Types of IT risks.mp4
    03:40
  • 006. IT risk management roles and responsibilities.mp4
    03:47
  • 007. Making an IT risk decision.mp4
    03:40
  • 008. IT risk management in small companies.mp4
    04:18
  • 009. IT risk management in medium companies.mp4
    06:23
  • 010. IT risk management in large companies.mp4
    06:15
  • 011. Quantitative vs. qualitative risk assessments.mp4
    03:32
  • 012. The role of organizational culture.mp4
    02:37
  • 013. The minimum viable approach.mp4
    03:33
  • 014. Performing the IT risk assessment.mp4
    04:29
  • 015. Choosing an IT risk management framework.mp4
    04:21
  • 016. Choosing an IT risk management tool.mp4
    02:48
  • 017. Determining an acceptable level of IT risk.mp4
    03:16
  • 018. Using an IT risk register.mp4
    04:30
  • 019. IT risk management techniques.mp4
    06:39
  • 020. Choosing the right IT risk management technique.mp4
    05:43
  • 021. Choosing controls.mp4
    03:44
  • 022. Implementing controls.mp4
    03:49
  • 023. Operating controls.mp4
    05:11
  • 024. Validating controls.mp4
    03:14
  • 025. Next steps with managing risk in IT.mp4
    01:22
  • Description


    If you work in IT risk management, you already know that one of the biggest challenges you face is the fact that you have limited resources to manage seemingly unlimited risk. So, how can you use your limited resources to reduce your greatest IT risks down to an acceptable level? To do that you need to understand what IT risk management really is and how it works in practice. In this course, information security expert Kip Boyle teaches how to set your organization up for success so they can stay in control of their data and systems. Kip imparts knowledge that will help deliver solid results with confidence and clarity, no matter the size of your company or the size of your budget. As he shows, if you do IT risk management well, you’ll have no trouble complying with cybersecurity laws, regulations, and customer requirements that require you to take a risk-based approach to protecting your digital assets.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    I’ve been working in cybersecurity since 1992. I started as an air force officer, leading information technology teams. My assignments had us handling very sensitive information related to air-to-air weapons testing, so we were expected to practice what I now call “good cyber hygiene”. My most challenging job during this time was director of wide area network security for the F-22 “Raptor”. At the time, we were getting ready for the first production jets to come down the assembly line. It was very exciting! After the USAF, as a project leader at Stanford Research (SRI), I helped many Fortune 100 firms grapple with cybersecurity on a large scale. The problems they were dealing with were often 5 years or more ahead of the mainstream. So, there were no “off-the-shelf” solutions and many of our customers didn’t even know where to start. With no one else to turn to, they would come to us. Fast forward a few years and I was selected to be Chief Information Security Officer (CISO) of an insurance company. They owned a few subsidiaries, so I was also providing cybersecurity leadership to senior decision-makers of a community bank, credit union, debit/credit card transaction processor, and an IT managed service provider. I learned a lot about the business value of cybersecurity during those years. Then, in June of 2015, I launched my own company, Cyber Risk Opportunities. These days, cyberattacks are hurting businesses, even bankrupting them. That's wrong! We help executives manage cyber as the business risk it has become. So they’ll be ready no matter what happens. Setting priorities is a big goal in our work. Today, we have a lot of customers. Right now, we’re helping both a professional basketball team and a biotech company optimize their cyber risk management programs. It’s great to be able to use the same approach to help organizations that are so different in just about every obvious way. But, just under the surface, they are both very similar in terms of the cyber risk practices they need to follow. My mission is to enable executives to become more proficient cyber risk managers. Our customers include the U.S. Federal Reserve Bank, Boeing, Visa, Intuit, Mitsubishi, DuPont, and many others. And, because so many organizations in the US need better cyber risk management at the executive level, we’ve launched a partnership program so other professionals in positions of trust, such as lawyers and technology service providers, can use our tools and methods to help their existing customers thrive as cyber risk managers. Ask me about it!
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 25
    • duration 1:38:22
    • Release Date 2023/01/10