Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Conducting Information Security Risk Assessments

This course is open to:

Conducting Information Security Risk Assessments will benefit anyone involved in information security. This course is designed for those who want to know more about Information Security Risk Assessments, how to conduct them and how to apply how to apply the results to their organization: security.

DURATION: 3 Days Instructor: Doug Landoll

Conducted properly cybersecurity risk assessments provide managers with the feedback needed to understand threats to corporate assets, determine vulnerabilities of current controls, and select appropriate safeguards. Performed incorrectly, cybersecurity risk assessments can provide a false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value.

Based on best practices and approaches detailed in best-selling cybersecurity risk assessment text: The Security Risk Assessment Handbook, this course gives you detailed instruction on how to conduct a risk assessment effectively and efficiently. This course is taught by the book's author: Doug Landoll.

Provider

  • Lantego logo