Building and operating an information security program at your organization can be challenging. The scope can be vast and complex. Thinking of all the ways an organization can fail and coming up with actionable measures you can take to prevent issues, mitigate risk, or recover from events is a large undertaking. In this course, Kip Boyle, president of Cyber Risk Opportunities, guides you through the entire process of creating an information security program, rolling it out to your organization, and maintaining it for continuous risk management.
Goals and components of an information security program
Measuring and managing information risks
Reducing risks to an acceptable level
Using a workflow to organize your work
Communicating progress with executives and stakeholders
|File siza||36 MB|