Information Security Risk Management

Understand the concepts around managing information security risk. Conduct risk-based evaluation of the threats around your information to gain a clear view and prioritize areas for protection.

What You Will Learn:

What is Information Security Risk Management (ISRM) and its main concepts.

The importance of an Information Security Risk Management program within an organization.

The way risk management connects with other various information security functions like vulnerability management, incident response, threat hunting and others.

How to manage and treat risks that threaten your information assets.

How to measure the effectiveness of your risk management program.

Payment Information

Contact

Billing Address

Coupon Code

[[coupon_message.text]] [[cart_coupon.text]]

Payment Methods

PayPal selected.

After submitting, you will be redirected to the PayPal website to fill out your payment information. You will be redirected back to our site once the payment is completed.

Apple Pay selected.

Another step will appear to securely submit your payment information.

Google Pay selected.

Another step will appear to securely submit your payment information.

The Complete NIST Framework Course for Cyber Risk Management

Add this course now to gain in-demand skills required to advance your career. 

Learn everything you need to know about this wonderful framework and be able to work with it in any organization. Learn how to apply and manage the most popular cyber security risk management framework to any organization. 
[[3499 | currency]]

Mitigating M&A Cybersecurity Risks

Add this course now to gain in-demand skills required to advance your career. 

Be better informed about how to help guide your company through the cybersecurity minefield that’s always part of a merger and acquisition process. 
[[6999 | currency]]

Design, Build, & Implement Information Security Compliance

Add this course now to gain in-demand skills required to advance your career.  

Protecting data requires you to put the right controls in place and document all security activities. Learn the full life cycle of establishing, maintaining, and auditing your security program. 
[[5999 | currency]]

Order Summary

[[invoiceItem.description]]
[[subscriptionsByProductId[invoiceItem.product_id].plan_description]]
REMOVE
[[invoiceItem.quantity]] x [[invoiceItem.unit_price | currency]]
Subtotal:
[[checkoutContext.order.invoice.subtotal | currency]]
Tax:
[[checkoutContext.order.invoice.tax | currency]]
Shipping:
[[checkoutContext.order.invoice.shipping | currency]]
Discounts:
-[[checkoutContext.order.invoice.discount | currency]]
Total:
[[checkoutContext.order.invoice.total | currency]]