The Management's Guide to Understanding Risk Management Decisions in Cybersecurity and Information Technology (IT)!
About This Video
- You will learn to better understand these scenarios, what caused the outage/breach.
- Why managers may have made the decisions they did that led up to them.
Have you ever wondered why your organization's executives or your manager made a decision to fund or not fund your project? In this course, you will get an inside look at how cybersecurity and information technology (IT) managers determine which projects they will support with funding and which they won't based on a preliminary risk analysis. Over the past two decades, I have worked in the cybersecurity and information technology realm, fighting for my projects to become funded. Early in my career, I didn't understand why certain projects would be funded and executed, while others wouldn't. What I learned, it all came down to risk management by our executives and managers. You will learn the terms used by executives and managers in discussing risk management, and how to apply the concepts of risk management to your networks, systems, and projects. This course is not an operational or tactical course that focuses on how you will secure your networks, but instead focuses on the mindset of managers and teaches you how to think like they do. Once you master these concepts, it is much easier to build your business case for your projects and justify your budgetary needs. This course also includes two case studies of what happens when risk management fails, as demonstrated by the Amazon Web Services outage and Equifax data breach that both occurred in 2017.
Table of contents
Chapter 1 : Introduction
- Introduction 00:01:30
- Chapter 2 : What is Risk?
- Chapter 3 : What Can You Do With Risk?
- Chapter 4 : Calculating Risk
Chapter 5 : Risk Management in the Real World
- Risk Management in the Real World 00:00:59
- Corey Charles - IT Manager (Vulnerability Management) 00:20:07
- David Anderson - Health Care Industry 00:26:42
- Tu Laniyonu - Insider Threat 00:21:51
- Chapter 6 : Conclusion
- Title: Risk Management for Cybersecurity and IT Managers
- Release date: May 2018
- Publisher(s): Packt Publishing
- ISBN: 9781789531992
You might also like
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
The Beginners 2020 Cyber Security Awareness Training Course
Learn to spot targeted email phishing, social engineering attacks, hacker tactics, and browser and mobile threats …
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction This course is a complete guide to help …
The Art of Hacking (Video Collection)
26 Hours of Video Instruction Description Your complete guide to help you get up and running …