In this video, we’re taking you step by step tutorial on how to conduct a cybersecurity risk assessment.
Risk assessments are a critical piece of an information security program and understanding how to do them and why we do them will enable you to understand a critical piece of the GRC side of the house.
π Show Notes π
β° Markers
0:10 Preview
0:32 Why cyber risk assessment?
2:30 How do you do a Cyber Risk Assessment (case study walkthrough)
4:00 Getting intel on how your organization is going to use a system
5:23 Why we call it information security really (over cybersecurity)
7:02 You got the data, now which risk assessment method to choose
10:40 Now you have your risks, how to prioritize them
12:03 What is and how to use a risk register (aka POAM)
Simply Cyber’s mission is to help purpose driven professionals make and and take a cybersecurity career further, faster.
———————————————————————————
π€ Social Media π€
LinkedIn:
Twitter:
YouTube:
Discord:
Twitch:
———————————————————————————
π₯ My Curated Free Cyber Resources:
———————————————————————————
———————————————————————————
ππΌ Donate ππΌ
Like the channel and got value? Please consider supporting the channel
———————————————————————————
———————————————————————————
π Merch π
ππΌ SimplyCyber Branded Gear:
———————————————————————————
π₯ My livestreams are produced through StreamYard. Get a $10 credit using my referral link below if you ever upgrade to pro plan.
STREAMYARD $10 REFERRAL –
Disclaimer: All content reflects the thoughts and opinions of Gerald Auger and the speakers themselves, and are not affiliated with the employer of those individuals unless explicitly stated.