Risk Management in CyberSecurityhttpswww.youtube.co.docx

D

Risk Management in CyberSecurity https://www.youtube.com/watch?v=1aX29t2wBYQ In the video, the presenter describes steps that businesses and other entities can take to assess, manage and secure their operations from cyber attacks. In the initial section, the presentation asserts that Cyber-attacks have today become more pervasive than ever. Each and every business in the world today, whether small or large, is at a risk of cyber-attack. Some of the issues addressed by the video include the breach lessons learnt in 2014 and the threats that were experienced in 2015. More importantly, it deals with issues of the drivers behind CuberSecurity risk management adoption. In addition, the video talks about the most important impacts that CyberSecurity threats have on businesses all over the world. Furthermore, it deals with the frequency of assessing the risks and the benefits of continuous monitoring of security. Moreover, a tool known as Aegify automated tool is described in details. The tool is used in the management of risk, security and compliance. Today in the world of technology, there have been numerous inventions such as Machine Learning (ML) and Artificial Intelligence (AI) (Sun, pg. 4). Consequently, these new technologies have come with the capacity to enhance the productivity, user engagement and revenue of a company. Nevertheless, these new technologies also come with an increased risk pertaining to Cyber-attacks which has devastated many businesses. Therefore, it is important for students to gain the knowledge about these new technologies and the risks attached to them. More importantly, the video suggest that students need to gain the knowledge on how to assess, manage and secure important assets from the impending attacks by the technologies. From the video, students are exposed to the factors that drive companies to adopt CyberSecurity risk management strategies. Thus, it exposes them to important source of information which they can employ in their future careers as IT professionals to secure businesses from risks. https://www.youtube.com/watch?v=Z1w0wCIOHHw The video is a short presentation of the most fundamental principles that should be considered to ensure formulation of an effective CyberSecurity risk management program. Organizations are today faced with the emergence of new regulations on CyberSecurity risk management. CyberSecurity risk programs incorporates computer hardware, software, algorithms, and programming. Nevertheless, the impact of these programs are only felt upon interaction with humans. For an organization to claim to have an effective risk management program, it is required to have everything, from incidence response plan to program policies as well as breach notification procedures. The video provides an example of the banking and insurance companies that have to prove compliance to their industry regulators. More importantly, however, the video asserts that each and every business needs to understand the .

Risk Management in CyberSecurity
https://www.youtube.com/watch?v=1aX29t2wBYQ
In the video, the presenter describes steps that businesses and
other entities can take to assess, manage and secure their
operations from cyber attacks. In the initial section, the
presentation asserts that Cyber-attacks have today become more
pervasive than ever. Each and every business in the world
today, whether small or large, is at a risk of cyber-attack. Some
of the issues addressed by the video include the breach lessons
learnt in 2014 and the threats that were experienced in 2015.
More importantly, it deals with issues of the drivers behind
CuberSecurity risk management adoption. In addition, the video
talks about the most important impacts that CyberSecurity
threats have on businesses all over the world. Furthermore, it
deals with the frequency of assessing the risks and the benefits
of continuous monitoring of security. Moreover, a tool known
as Aegify automated tool is described in details. The tool is
used in the management of risk, security and compliance.
Today in the world of technology, there have been numerous
inventions such as Machine Learning (ML) and Artificial
Intelligence (AI) (Sun, pg. 4). Consequently, these new
technologies have come with the capacity to enhance the
productivity, user engagement and revenue of a company.
Nevertheless, these new technologies also come with an
increased risk pertaining to Cyber-attacks which has devastated
many businesses. Therefore, it is important for students to gain
the knowledge about these new technologies and the risks
attached to them. More importantly, the video suggest that
students need to gain the knowledge on how to assess, manage
and secure important assets from the impending attacks by the
technologies. From the video, students are exposed to the
factors that drive companies to adopt CyberSecurity risk
management strategies. Thus, it exposes them to important
source of information which they can employ in their future
careers as IT professionals to secure businesses from risks.
https://www.youtube.com/watch?v=Z1w0wCIOHHw
The video is a short presentation of the most fundamental
principles that should be considered to ensure formulation of an
effective CyberSecurity risk management program.
Organizations are today faced with the emergence of new
regulations on CyberSecurity risk management. CyberSecurity
risk programs incorporates computer hardware, software,
algorithms, and programming. Nevertheless, the impact of these
programs are only felt upon interaction with humans. For an
organization to claim to have an effective risk management
program, it is required to have everything, from incidence
response plan to program policies as well as breach notification
procedures. The video provides an example of the banking and
insurance companies that have to prove compliance to their
industry regulators. More importantly, however, the video
asserts that each and every business needs to understand the
importance of approaching CyberSecurity risk management
programs in a holistic manner. Furthermore, one ought to know
what to do before the real risk occurs. Finally, it is apparent
that there are certain important components of modern
CyberSecurity programs. Fundamentally, 10 principles of risk
management are provided in the presentation. The principles
include simplicity, abstraction, least privileged, domain
separation, process isolation, resource encapsulation, layering,
modularization, minimization and information hiding.
Therefore, it is pivotal for students to understand that there are
a set of principles that must be followed in-order to achieve an
effective CyberSecurity risk management (Sun, pg. 2). Risk
management principles pertain to how people and organizations
make decision concerning the use of technology. The 10
principles of risk management helps students to identify the
important factors to consider when engaging in the process of
risk management. For instance, when handling a less
complicated system comes with the advantage that it becomes
easier to monitor, troubleshoot and fix. In addition, it becomes
less likely to encounter any problems. All these are presented
by the principle of simplicity. On the other hand, the principle
of abstraction requires that the process comes up with a fancy
word that summarizes the events and becomes easier to
understand. Finally, the principle of least privileged states that
there should be a boundary and limits on access to your
information.
https://www.youtube.com/watch?v=9-3UXZhYyMk
The video focuses on CyberSecurity risk assessments. In the
video, data and information is presented concerning a study on
CyberSecurity risk management by different managers. The vied
therefore begins by asking the question “how effective is your
IT governance structure and what is your risk appetite?” The
presentation examines the IT structure of companies and
questions managers concerning IT compliance practices. Among
the factors that are considered are whether there is an effective
risk governance structure, whether there are effective
information risk policies and whether an adequate cyber
insurance is present. More importantly, the video provides data
on these topics for easier interpretation. For instance, that 12%
of the worst breaches in security are as a result of giving less
priority to security by managers. In addition, in the past one
year, 26% of the IT departments have not presented to their
boards reports on CyberSecurity risk management. However,
this is taking place in the age when the IT world is full of
threats.
Students benefit from the information presented in the video by
first understanding that the IT world is full of threats and these
threats require effective means to mitigate. Furthermore, the
most fundamental information from the video is the need to
form an effective risk assessment process. In-order to counter
the threats of Cyber-crime, it is imperative that companies come
up with better strategies. Risk assessment refers to the process
of conducting internal security audits which help companies to
keep up with the compliance programs (Lavelanet, pg. 1).
Apparently, the study carried out shows that most risk occur as
a result of negligence. Furthermore, most IT departments fail to
report the risk management processes to their boards and this
further enhances the risks. Assessing and reporting the risk
makes it easier for the company to deal with the risk. Therefore,
assessments and reporting of the risks should be conducted on a
regular basis.
https://www.youtube.com/watch?v=kOPm7rWm-J4
The video is on risk avoidance and it kicks off by stating that
risk avoidance means stopping participating in high risk
activities. In other words, risk avoidance is the direct opposite
of accepting the risk. Furthermore, the video suggests that risk
avoidance is all or nothing kind of undertaking (Bugajenko, pg.
1). The video provides the example of universities and colleges
which have access to open internet thus people take advantage
by downloading very risky materials. However, the
administration acknowledges that the open access to the internet
may be good but there is need to avoid the risk. A decision has
to be always made on a business perspective on whether it is
something worth risking. More importantly, the video suggests
that one of the ways to avoid the risk is to transfer it to
someone else. For instance, if we expect a hurricane to occur,
then we need to insure our assets so that in case it really takes
place, the insurance company bears the risk. Acceptance is
another way to avoid risks and this entails taking a bold
business decision that the company has to take the risk of
engaging in a project.
Students benefit from the information since it presents ways in
which risks can be avoided and in case it cannot be avoided
totally, how it can be transferred or accepted. The information
is pivotal for the students in learning about risk management.
For instance, in an insurance situation, when you get rid of a
risky object from your vicinity before it harms you is a risk
avoidance. In this case, the insurance company has avoided the
impending risk that the object imposed on an individual.
Nevertheless, it is the practice of most of companies to sit back
and wait for the harm to be caused thus incurring a lot of costs.
The same applies to IT industry where some organizations
simply decide that taking part in a project is too risky and
cannot be continued anymore.
https://www.youtube.com/watch?v=3SMQ-O1cHWU
The first video presents a reporting framework for
CyberSecurity risk management as presented by AICPA. AICPA
has developed a new framework for reporting risk pertaining to
CyberSecurity to help organizations to communicate and report
on CyberSecurity risk management programs (AICPA, pg. 2).
Thus, the organization aims at providing pivotal engagements
that can assist their clients to strengthen their own programs. In
addition, they also offer examination engagement as well as
opinion on the entity’s description and effectiveness of
controls. The presentation begins by offering an in-depth
description of the meaning of the concept of CyberSecurity risk
management. According to the video, there are certain core
principles of CyberSecurity risk management that organizations
ought to learn in-order to formulate better management and
mitigation strategies. Furthermore, the principles of risk
mitigation and risk assessment should employ the use of both
qualitative and quantitative methodologies in-order to become
effective. Fundamentally, risk management as a whole forms the
foundation of much of IT decisions within a company. As a
consequence, these are important in assisting other students to
learn about issues of CyberSecurity risk management.
Companies often present CyberSecurity reports to boards, audits
and risk management committees on a regular basis. As a
consequence, they are required to formulate and evaluate a risk
reporting framework which is an essential component of this
process. AICPA's CyberSecurity Risk Management Reporting
Framework is therefore designed to enable companies gain
confidence as well as guidance on how to approach the Board of
Directors on issues pertaining to CyberSecurity risk
management. Furthermore, the framework is designed to help
the compliance and information security teams to better
approach issues of CyberSecurity. All the stakeholders of a
business are expected to receive actionable and contextualized
intelligence on cyber risk which is then used to enhance proper
escalation and notification procedures to ensure that any
pending issue is effectively resolved. The main advantage of the
reporting framework is that it is based on agreed standards for
both internal and outsourced data related processes.
Furthermore, AICPA's CyberSecurity Risk Management
Reporting Framework is based on data confidentiality, policies,
availability and integrity of the risk management processes of a
business.
Works Cited
AICPA. Risk Reporting Framework. AICPA. 2019.
Bugajenko, Olga. Risk Avoidance vs. Risk Mitigation.
Study.com. 2019. Retrieved from
https://study.com/academy/lesson/risk-avoidance-vs-risk-
mitigation.html
Lavelanet, Natacha. The Importance of Security Audits and
Assessments. New Era Technology. 2017. Retrieved from
https://www.neweratech.com/2017/08/14/the-importance-of-
security-audits-and-assessments/
Sun, Tong. Cybersecurity Risk Management. edX Inc. 2019.
Retrieved from https://www.edx.org/course/cybersecurity-
risk-management
Risk Management in CyberSecurityhttpswww.youtube.co.docx

Recomendados

Security Risk Management Essay por
Security Risk Management EssaySecurity Risk Management Essay
Security Risk Management EssayApa Papers For Sale Trinity
7 visualizações28 slides
The Competency Of Quantum Technologies Information... por
The Competency Of Quantum Technologies Information...The Competency Of Quantum Technologies Information...
The Competency Of Quantum Technologies Information...Maggie Turner
2 visualizações40 slides
SBIC Enterprise Information Security Strategic Technologies por
SBIC Enterprise Information Security Strategic TechnologiesSBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesEMC
1.2K visualizações20 slides
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016 por
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016Ben Browning
107 visualizações4 slides
Applying Risk Management Essay por
Applying Risk Management EssayApplying Risk Management Essay
Applying Risk Management EssayCollege Papers To Buy Singapore
20 visualizações28 slides
Recommendation For Current It Security Policy por
Recommendation For Current It Security PolicyRecommendation For Current It Security Policy
Recommendation For Current It Security PolicyKatie Parker
2 visualizações81 slides

Mais conteúdo relacionado

Similar a Risk Management in CyberSecurityhttpswww.youtube.co.docx

SBIC Report : Transforming Information Security: Future-Proofing Processes por
SBIC Report : Transforming Information Security: Future-Proofing ProcessesSBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesEMC
1.1K visualizações16 slides
How close is your organization to being breached | Safe Security por
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
55 visualizações14 slides
European Risk Management Seminar 2018 - Cyber Report por
European Risk Management Seminar 2018 - Cyber Report European Risk Management Seminar 2018 - Cyber Report
European Risk Management Seminar 2018 - Cyber Report FERMA
1.8K visualizações23 slides
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018 por
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018FERMA
2K visualizações32 slides
Countermeasures For Information Assurance por
Countermeasures For Information AssuranceCountermeasures For Information Assurance
Countermeasures For Information AssuranceKelley Hunter
3 visualizações81 slides
Developing A Quality Product Within Budget And On Time por
Developing A Quality Product Within Budget And On TimeDeveloping A Quality Product Within Budget And On Time
Developing A Quality Product Within Budget And On TimeAshley Davis
3 visualizações81 slides

Similar a Risk Management in CyberSecurityhttpswww.youtube.co.docx(20)

SBIC Report : Transforming Information Security: Future-Proofing Processes por EMC
SBIC Report : Transforming Information Security: Future-Proofing ProcessesSBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing Processes
EMC1.1K visualizações
How close is your organization to being breached | Safe Security por Rahul Tyagi
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
Rahul Tyagi55 visualizações
European Risk Management Seminar 2018 - Cyber Report por FERMA
European Risk Management Seminar 2018 - Cyber Report European Risk Management Seminar 2018 - Cyber Report
European Risk Management Seminar 2018 - Cyber Report
FERMA1.8K visualizações
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018 por FERMA
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
FERMA2K visualizações
Countermeasures For Information Assurance por Kelley Hunter
Countermeasures For Information AssuranceCountermeasures For Information Assurance
Countermeasures For Information Assurance
Kelley Hunter3 visualizações
Developing A Quality Product Within Budget And On Time por Ashley Davis
Developing A Quality Product Within Budget And On TimeDeveloping A Quality Product Within Budget And On Time
Developing A Quality Product Within Budget And On Time
Ashley Davis3 visualizações
Walmart Security Policy Summary por Alyssa Jones
Walmart Security Policy SummaryWalmart Security Policy Summary
Walmart Security Policy Summary
Alyssa Jones15 visualizações
Module 2 - Cybersecurity On the Defense.pdf por Humphrey Humphrey
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
Humphrey Humphrey69 visualizações
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World por TEWMAGAZINE
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
TEWMAGAZINE9 visualizações
Most Expensive IT Vulnerability por Veronica Sulaiman
Most Expensive IT VulnerabilityMost Expensive IT Vulnerability
Most Expensive IT Vulnerability
Veronica Sulaiman3 visualizações
Most Expensive IT Vulnerability por Katie Ellis
Most Expensive IT VulnerabilityMost Expensive IT Vulnerability
Most Expensive IT Vulnerability
Katie Ellis8 visualizações
Cybersecurity Risk Management for Financial Institutions por Sarah Cirelli
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
Sarah Cirelli1.9K visualizações
How to assess your Cybersecurity Vulnerability_.pdf por Metaorange
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
Metaorange9 visualizações
How to assess your Cybersecurity Vulnerability_.pptx por Metaorange
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
Metaorange10 visualizações
A Brief Note On Workforce Injury Or Death por Tina Mclellan
A Brief Note On Workforce Injury Or DeathA Brief Note On Workforce Injury Or Death
A Brief Note On Workforce Injury Or Death
Tina Mclellan2 visualizações
Meraj Ahmad - Information security in a borderless world por nooralmousa
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa922 visualizações
Cyber crime liability report por Sayali Sawant
Cyber crime liability reportCyber crime liability report
Cyber crime liability report
Sayali Sawant883 visualizações

Mais de daniely50

Rockets are launched until the first successful launchinghas take.docx por
Rockets are launched until the first successful launchinghas take.docxRockets are launched until the first successful launchinghas take.docx
Rockets are launched until the first successful launchinghas take.docxdaniely50
24 visualizações1 slide
Robert Nardelli was heavily criticized for his leadership style and .docx por
Robert Nardelli was heavily criticized for his leadership style and .docxRobert Nardelli was heavily criticized for his leadership style and .docx
Robert Nardelli was heavily criticized for his leadership style and .docxdaniely50
6 visualizações1 slide
Robert Williams, Introduction” (from textbook).docx por
Robert Williams, Introduction” (from textbook).docxRobert Williams, Introduction” (from textbook).docx
Robert Williams, Introduction” (from textbook).docxdaniely50
4 visualizações1 slide
Robinson states that Rational choice and deterrence theories are tw.docx por
Robinson states that Rational choice and deterrence theories are tw.docxRobinson states that Rational choice and deterrence theories are tw.docx
Robinson states that Rational choice and deterrence theories are tw.docxdaniely50
3 visualizações1 slide
rite a program to score the paper-rock-scissor game. Each of two.docx por
rite a program to score the paper-rock-scissor game. Each of two.docxrite a program to score the paper-rock-scissor game. Each of two.docx
rite a program to score the paper-rock-scissor game. Each of two.docxdaniely50
4 visualizações2 slides
RoadblocksYour supervisor made suggestions in your first draft. .docx por
RoadblocksYour supervisor made suggestions in your first draft. .docxRoadblocksYour supervisor made suggestions in your first draft. .docx
RoadblocksYour supervisor made suggestions in your first draft. .docxdaniely50
2 visualizações2 slides

Mais de daniely50(20)

Rockets are launched until the first successful launchinghas take.docx por daniely50
Rockets are launched until the first successful launchinghas take.docxRockets are launched until the first successful launchinghas take.docx
Rockets are launched until the first successful launchinghas take.docx
daniely5024 visualizações
Robert Nardelli was heavily criticized for his leadership style and .docx por daniely50
Robert Nardelli was heavily criticized for his leadership style and .docxRobert Nardelli was heavily criticized for his leadership style and .docx
Robert Nardelli was heavily criticized for his leadership style and .docx
daniely506 visualizações
Robert Williams, Introduction” (from textbook).docx por daniely50
Robert Williams, Introduction” (from textbook).docxRobert Williams, Introduction” (from textbook).docx
Robert Williams, Introduction” (from textbook).docx
daniely504 visualizações
Robinson states that Rational choice and deterrence theories are tw.docx por daniely50
Robinson states that Rational choice and deterrence theories are tw.docxRobinson states that Rational choice and deterrence theories are tw.docx
Robinson states that Rational choice and deterrence theories are tw.docx
daniely503 visualizações
rite a program to score the paper-rock-scissor game. Each of two.docx por daniely50
rite a program to score the paper-rock-scissor game. Each of two.docxrite a program to score the paper-rock-scissor game. Each of two.docx
rite a program to score the paper-rock-scissor game. Each of two.docx
daniely504 visualizações
RoadblocksYour supervisor made suggestions in your first draft. .docx por daniely50
RoadblocksYour supervisor made suggestions in your first draft. .docxRoadblocksYour supervisor made suggestions in your first draft. .docx
RoadblocksYour supervisor made suggestions in your first draft. .docx
daniely502 visualizações
rite a 500 word Evaluation Essay. A Memoir about the Imp.docx por daniely50
rite a 500 word Evaluation Essay. A Memoir about the Imp.docxrite a 500 word Evaluation Essay. A Memoir about the Imp.docx
rite a 500 word Evaluation Essay. A Memoir about the Imp.docx
daniely502 visualizações
rite 400–600 words that respond to the following questions with your.docx por daniely50
rite 400–600 words that respond to the following questions with your.docxrite 400–600 words that respond to the following questions with your.docx
rite 400–600 words that respond to the following questions with your.docx
daniely502 visualizações
Rogers Communications Historical BackgroundOne of the Largest an.docx por daniely50
Rogers Communications Historical BackgroundOne of the Largest an.docxRogers Communications Historical BackgroundOne of the Largest an.docx
Rogers Communications Historical BackgroundOne of the Largest an.docx
daniely505 visualizações
Risk Management PlanThe PCNet Project (B) Dynamically Mana.docx por daniely50
Risk Management PlanThe PCNet Project (B) Dynamically Mana.docxRisk Management PlanThe PCNet Project (B) Dynamically Mana.docx
Risk Management PlanThe PCNet Project (B) Dynamically Mana.docx
daniely507 visualizações
Roberts Company produces a single product. This year, the companys .docx por daniely50
Roberts Company produces a single product. This year, the companys .docxRoberts Company produces a single product. This year, the companys .docx
Roberts Company produces a single product. This year, the companys .docx
daniely504 visualizações
Risk ManagementInsurance companies willingly take on our risk .docx por daniely50
Risk ManagementInsurance companies willingly take on our risk .docxRisk ManagementInsurance companies willingly take on our risk .docx
Risk ManagementInsurance companies willingly take on our risk .docx
daniely502 visualizações
Risky Behaviors Encountered by AdolescentsInstructionsAc.docx por daniely50
Risky Behaviors Encountered by AdolescentsInstructionsAc.docxRisky Behaviors Encountered by AdolescentsInstructionsAc.docx
Risky Behaviors Encountered by AdolescentsInstructionsAc.docx
daniely503 visualizações
Rob and Dave run a 100-m race, crossing the finish line in a dead he.docx por daniely50
Rob and Dave run a 100-m race, crossing the finish line in a dead he.docxRob and Dave run a 100-m race, crossing the finish line in a dead he.docx
Rob and Dave run a 100-m race, crossing the finish line in a dead he.docx
daniely505 visualizações
ROBERT M. BOHMUniversity of Central FloridaandBRENDA.docx por daniely50
ROBERT M. BOHMUniversity of Central FloridaandBRENDA.docxROBERT M. BOHMUniversity of Central FloridaandBRENDA.docx
ROBERT M. BOHMUniversity of Central FloridaandBRENDA.docx
daniely502 visualizações
RobertA multicultural city means a city whose members have a d.docx por daniely50
RobertA multicultural city means a city whose members have a d.docxRobertA multicultural city means a city whose members have a d.docx
RobertA multicultural city means a city whose members have a d.docx
daniely502 visualizações
Rocky Mountain Manufacturing produces a single product. The original.docx por daniely50
Rocky Mountain Manufacturing produces a single product. The original.docxRocky Mountain Manufacturing produces a single product. The original.docx
Rocky Mountain Manufacturing produces a single product. The original.docx
daniely502 visualizações
rite a 4–5 page evaluation of your chosen company’s performance .docx por daniely50
rite a 4–5 page evaluation of your chosen company’s performance .docxrite a 4–5 page evaluation of your chosen company’s performance .docx
rite a 4–5 page evaluation of your chosen company’s performance .docx
daniely502 visualizações
Risks of ExpansionCarry out individual research using a Univer.docx por daniely50
Risks of ExpansionCarry out individual research using a Univer.docxRisks of ExpansionCarry out individual research using a Univer.docx
Risks of ExpansionCarry out individual research using a Univer.docx
daniely502 visualizações
Risks are common for all firms, but there are different levels of ri.docx por daniely50
Risks are common for all firms, but there are different levels of ri.docxRisks are common for all firms, but there are different levels of ri.docx
Risks are common for all firms, but there are different levels of ri.docx
daniely502 visualizações

Último

Sociology KS5 por
Sociology KS5Sociology KS5
Sociology KS5WestHatch
76 visualizações23 slides
Relationship of psychology with other subjects. por
Relationship of psychology with other subjects.Relationship of psychology with other subjects.
Relationship of psychology with other subjects.palswagata2003
48 visualizações16 slides
Use of Probiotics in Aquaculture.pptx por
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptxAKSHAY MANDAL
104 visualizações15 slides
When Sex Gets Complicated: Porn, Affairs, & Cybersex por
When Sex Gets Complicated: Porn, Affairs, & CybersexWhen Sex Gets Complicated: Porn, Affairs, & Cybersex
When Sex Gets Complicated: Porn, Affairs, & CybersexMarlene Maheu
73 visualizações73 slides
Monthly Information Session for MV Asterix (November) por
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)Esquimalt MFRC
58 visualizações26 slides
Narration lesson plan por
Narration lesson planNarration lesson plan
Narration lesson planTARIQ KHAN
59 visualizações11 slides

Último(20)

Sociology KS5 por WestHatch
Sociology KS5Sociology KS5
Sociology KS5
WestHatch76 visualizações
Relationship of psychology with other subjects. por palswagata2003
Relationship of psychology with other subjects.Relationship of psychology with other subjects.
Relationship of psychology with other subjects.
palswagata200348 visualizações
Use of Probiotics in Aquaculture.pptx por AKSHAY MANDAL
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptx
AKSHAY MANDAL104 visualizações
When Sex Gets Complicated: Porn, Affairs, & Cybersex por Marlene Maheu
When Sex Gets Complicated: Porn, Affairs, & CybersexWhen Sex Gets Complicated: Porn, Affairs, & Cybersex
When Sex Gets Complicated: Porn, Affairs, & Cybersex
Marlene Maheu73 visualizações
Monthly Information Session for MV Asterix (November) por Esquimalt MFRC
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)
Esquimalt MFRC58 visualizações
Narration lesson plan por TARIQ KHAN
Narration lesson planNarration lesson plan
Narration lesson plan
TARIQ KHAN59 visualizações
Drama KS5 Breakdown por WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch87 visualizações
CUNY IT Picciano.pptx por apicciano
CUNY IT Picciano.pptxCUNY IT Picciano.pptx
CUNY IT Picciano.pptx
apicciano54 visualizações
How to empty an One2many field in Odoo por Celine George
How to empty an One2many field in OdooHow to empty an One2many field in Odoo
How to empty an One2many field in Odoo
Celine George72 visualizações
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB... por Nguyen Thanh Tu Collection
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
Nguyen Thanh Tu Collection73 visualizações
MercerJesse2.1Doc.pdf por jessemercerail
MercerJesse2.1Doc.pdfMercerJesse2.1Doc.pdf
MercerJesse2.1Doc.pdf
jessemercerail237 visualizações
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx por ISSIP
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
ISSIP379 visualizações
Structure and Functions of Cell.pdf por Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan701 visualizações
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively por PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 598 visualizações
Classification of crude drugs.pptx por GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1492 visualizações
Create a Structure in VBNet.pptx por Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P75 visualizações
Java Simplified: Understanding Programming Basics por Akshaj Vadakkath Joshy
Java Simplified: Understanding Programming BasicsJava Simplified: Understanding Programming Basics
Java Simplified: Understanding Programming Basics
Akshaj Vadakkath Joshy316 visualizações
Ch. 7 Political Participation and Elections.pptx por Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala105 visualizações

Risk Management in CyberSecurityhttpswww.youtube.co.docx

  • 1. Risk Management in CyberSecurity https://www.youtube.com/watch?v=1aX29t2wBYQ In the video, the presenter describes steps that businesses and other entities can take to assess, manage and secure their operations from cyber attacks. In the initial section, the presentation asserts that Cyber-attacks have today become more pervasive than ever. Each and every business in the world today, whether small or large, is at a risk of cyber-attack. Some of the issues addressed by the video include the breach lessons learnt in 2014 and the threats that were experienced in 2015. More importantly, it deals with issues of the drivers behind CuberSecurity risk management adoption. In addition, the video talks about the most important impacts that CyberSecurity threats have on businesses all over the world. Furthermore, it deals with the frequency of assessing the risks and the benefits of continuous monitoring of security. Moreover, a tool known as Aegify automated tool is described in details. The tool is used in the management of risk, security and compliance. Today in the world of technology, there have been numerous inventions such as Machine Learning (ML) and Artificial Intelligence (AI) (Sun, pg. 4). Consequently, these new technologies have come with the capacity to enhance the productivity, user engagement and revenue of a company. Nevertheless, these new technologies also come with an increased risk pertaining to Cyber-attacks which has devastated many businesses. Therefore, it is important for students to gain the knowledge about these new technologies and the risks attached to them. More importantly, the video suggest that students need to gain the knowledge on how to assess, manage
  • 2. and secure important assets from the impending attacks by the technologies. From the video, students are exposed to the factors that drive companies to adopt CyberSecurity risk management strategies. Thus, it exposes them to important source of information which they can employ in their future careers as IT professionals to secure businesses from risks. https://www.youtube.com/watch?v=Z1w0wCIOHHw The video is a short presentation of the most fundamental principles that should be considered to ensure formulation of an effective CyberSecurity risk management program. Organizations are today faced with the emergence of new regulations on CyberSecurity risk management. CyberSecurity risk programs incorporates computer hardware, software, algorithms, and programming. Nevertheless, the impact of these programs are only felt upon interaction with humans. For an organization to claim to have an effective risk management program, it is required to have everything, from incidence response plan to program policies as well as breach notification procedures. The video provides an example of the banking and insurance companies that have to prove compliance to their industry regulators. More importantly, however, the video asserts that each and every business needs to understand the importance of approaching CyberSecurity risk management programs in a holistic manner. Furthermore, one ought to know what to do before the real risk occurs. Finally, it is apparent that there are certain important components of modern CyberSecurity programs. Fundamentally, 10 principles of risk management are provided in the presentation. The principles include simplicity, abstraction, least privileged, domain separation, process isolation, resource encapsulation, layering, modularization, minimization and information hiding. Therefore, it is pivotal for students to understand that there are a set of principles that must be followed in-order to achieve an effective CyberSecurity risk management (Sun, pg. 2). Risk management principles pertain to how people and organizations make decision concerning the use of technology. The 10
  • 3. principles of risk management helps students to identify the important factors to consider when engaging in the process of risk management. For instance, when handling a less complicated system comes with the advantage that it becomes easier to monitor, troubleshoot and fix. In addition, it becomes less likely to encounter any problems. All these are presented by the principle of simplicity. On the other hand, the principle of abstraction requires that the process comes up with a fancy word that summarizes the events and becomes easier to understand. Finally, the principle of least privileged states that there should be a boundary and limits on access to your information. https://www.youtube.com/watch?v=9-3UXZhYyMk The video focuses on CyberSecurity risk assessments. In the video, data and information is presented concerning a study on CyberSecurity risk management by different managers. The vied therefore begins by asking the question “how effective is your IT governance structure and what is your risk appetite?” The presentation examines the IT structure of companies and questions managers concerning IT compliance practices. Among the factors that are considered are whether there is an effective risk governance structure, whether there are effective information risk policies and whether an adequate cyber insurance is present. More importantly, the video provides data on these topics for easier interpretation. For instance, that 12% of the worst breaches in security are as a result of giving less priority to security by managers. In addition, in the past one year, 26% of the IT departments have not presented to their boards reports on CyberSecurity risk management. However, this is taking place in the age when the IT world is full of threats. Students benefit from the information presented in the video by first understanding that the IT world is full of threats and these threats require effective means to mitigate. Furthermore, the most fundamental information from the video is the need to form an effective risk assessment process. In-order to counter
  • 4. the threats of Cyber-crime, it is imperative that companies come up with better strategies. Risk assessment refers to the process of conducting internal security audits which help companies to keep up with the compliance programs (Lavelanet, pg. 1). Apparently, the study carried out shows that most risk occur as a result of negligence. Furthermore, most IT departments fail to report the risk management processes to their boards and this further enhances the risks. Assessing and reporting the risk makes it easier for the company to deal with the risk. Therefore, assessments and reporting of the risks should be conducted on a regular basis. https://www.youtube.com/watch?v=kOPm7rWm-J4 The video is on risk avoidance and it kicks off by stating that risk avoidance means stopping participating in high risk activities. In other words, risk avoidance is the direct opposite of accepting the risk. Furthermore, the video suggests that risk avoidance is all or nothing kind of undertaking (Bugajenko, pg. 1). The video provides the example of universities and colleges which have access to open internet thus people take advantage by downloading very risky materials. However, the administration acknowledges that the open access to the internet may be good but there is need to avoid the risk. A decision has to be always made on a business perspective on whether it is something worth risking. More importantly, the video suggests that one of the ways to avoid the risk is to transfer it to someone else. For instance, if we expect a hurricane to occur, then we need to insure our assets so that in case it really takes place, the insurance company bears the risk. Acceptance is another way to avoid risks and this entails taking a bold business decision that the company has to take the risk of engaging in a project. Students benefit from the information since it presents ways in which risks can be avoided and in case it cannot be avoided totally, how it can be transferred or accepted. The information is pivotal for the students in learning about risk management. For instance, in an insurance situation, when you get rid of a
  • 5. risky object from your vicinity before it harms you is a risk avoidance. In this case, the insurance company has avoided the impending risk that the object imposed on an individual. Nevertheless, it is the practice of most of companies to sit back and wait for the harm to be caused thus incurring a lot of costs. The same applies to IT industry where some organizations simply decide that taking part in a project is too risky and cannot be continued anymore. https://www.youtube.com/watch?v=3SMQ-O1cHWU The first video presents a reporting framework for CyberSecurity risk management as presented by AICPA. AICPA has developed a new framework for reporting risk pertaining to CyberSecurity to help organizations to communicate and report on CyberSecurity risk management programs (AICPA, pg. 2). Thus, the organization aims at providing pivotal engagements that can assist their clients to strengthen their own programs. In addition, they also offer examination engagement as well as opinion on the entity’s description and effectiveness of controls. The presentation begins by offering an in-depth description of the meaning of the concept of CyberSecurity risk management. According to the video, there are certain core principles of CyberSecurity risk management that organizations ought to learn in-order to formulate better management and mitigation strategies. Furthermore, the principles of risk mitigation and risk assessment should employ the use of both qualitative and quantitative methodologies in-order to become effective. Fundamentally, risk management as a whole forms the foundation of much of IT decisions within a company. As a consequence, these are important in assisting other students to learn about issues of CyberSecurity risk management. Companies often present CyberSecurity reports to boards, audits and risk management committees on a regular basis. As a consequence, they are required to formulate and evaluate a risk reporting framework which is an essential component of this process. AICPA's CyberSecurity Risk Management Reporting Framework is therefore designed to enable companies gain
  • 6. confidence as well as guidance on how to approach the Board of Directors on issues pertaining to CyberSecurity risk management. Furthermore, the framework is designed to help the compliance and information security teams to better approach issues of CyberSecurity. All the stakeholders of a business are expected to receive actionable and contextualized intelligence on cyber risk which is then used to enhance proper escalation and notification procedures to ensure that any pending issue is effectively resolved. The main advantage of the reporting framework is that it is based on agreed standards for both internal and outsourced data related processes. Furthermore, AICPA's CyberSecurity Risk Management Reporting Framework is based on data confidentiality, policies, availability and integrity of the risk management processes of a business. Works Cited AICPA. Risk Reporting Framework. AICPA. 2019. Bugajenko, Olga. Risk Avoidance vs. Risk Mitigation. Study.com. 2019. Retrieved from https://study.com/academy/lesson/risk-avoidance-vs-risk- mitigation.html Lavelanet, Natacha. The Importance of Security Audits and Assessments. New Era Technology. 2017. Retrieved from https://www.neweratech.com/2017/08/14/the-importance-of- security-audits-and-assessments/ Sun, Tong. Cybersecurity Risk Management. edX Inc. 2019. Retrieved from https://www.edx.org/course/cybersecurity- risk-management