In this video, we’re taking you step by step tutorial on how to conduct a cybersecurity risk assessment.

Risk assessments are a critical piece of an information security program and understanding how to do them and why we do them will enable you to understand a critical piece of the GRC side of the house.

πŸ“’ Show Notes πŸ“’

⏰ Markers
0:10 Preview
0:32 Why cyber risk assessment?
2:30 How do you do a Cyber Risk Assessment (case study walkthrough)
4:00 Getting intel on how your organization is going to use a system
5:23 Why we call it information security really (over cybersecurity)
7:02 You got the data, now which risk assessment method to choose
10:40 Now you have your risks, how to prioritize them
12:03 What is and how to use a risk register (aka POAM)

Simply Cyber’s mission is to help purpose driven professionals make and and take a cybersecurity career further, faster.

———————————————————————————
🀝 Social Media 🀝
LinkedIn:
Twitter:
YouTube:
Discord:
Twitch:
———————————————————————————
πŸ”₯ My Curated Free Cyber Resources:
———————————————————————————

———————————————————————————
πŸ™ŒπŸΌ Donate πŸ™ŒπŸΌ
Like the channel and got value? Please consider supporting the channel

———————————————————————————

———————————————————————————
😎 Merch 😎
πŸ‘‰πŸΌ SimplyCyber Branded Gear:
———————————————————————————

πŸŽ₯ My livestreams are produced through StreamYard. Get a $10 credit using my referral link below if you ever upgrade to pro plan.
STREAMYARD $10 REFERRAL –

Disclaimer: All content reflects the thoughts and opinions of Gerald Auger and the speakers themselves, and are not affiliated with the employer of those individuals unless explicitly stated.

Share: