Completed
Unsolved problem in information security
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Minimum Viable Risk Management Program
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Unsolved problem in information security
- 3 Threat event
- 4 Vulnerability
- 5 Secondary loss event
- 6 Why have a risk management program?
- 7 Current options for small/immature orgs
- 8 Basic plan
- 9 Decide on scope
- 10 Inventory assets & owners
- 11 Sort the inventory by granularity
- 12 Example granularities
- 13 Perform Binary Risk Assessment
- 14 Binary Risk Assessment as part of a program
- 15 What is the purpose of risk assessment?
- 16 Asset owners decide what to do about low & medium risks
- 17 How to treat risk
- 18 What's the right level to sign off on a risk?
- 19 Likelihood/frequency of loss questions
- 20 Magnitude of loss questions
- 21 Binary Risk Assessment weaknesses
- 22 Add Factor Analysis of Information Risk
- 23 External Documentation
- 24 Risk Management Policy
- 25 Templates
- 26 Risk treatment decision template
- 27 Questions?