CIO Influence
CIO Influence News IT and DevOps Security

New Toolkit and Course From ISACA Help Practitioners Develop Risk Scenarios

New Toolkit and Course From ISACA Help Practitioners Develop Risk Scenarios

Risk Scenarios Starter Pack is free for ISACA members

One of the challenges for IT risk management is to identify important and relevant risk, and one of the best ways to do that is through a well-developed risk scenario providing a realistic and practical view of risk that may prevent an enterprise from achieving its business objectives, historical events, and emerging threats. ISACA has developed a Risk Scenarios Starter Pack and concise online course that will help break down each aspect of a risk scenario.

New toolkit and course from #ISACA help practitioners develop risk scenarios

The Risk Scenarios Starter Pack includes 10 sample risk scenarios that practitioners can use and tailor to their specific enterprises. Risk scenarios help improve communication about risk management by constructing a narrative that inspires individuals to act. Using risk scenarios helps the risk team to understand and explain risk to the business process owners and other stakeholders.

Latest Security News: New Study Shows That Drivers Want Connected Cars – But They Still Have Concerns

The 10 scenarios included in the Risk Scenarios Starter Pack are:

  1. IT Services Change Management
  2. Inability to Recruit or Retain IT Staff
  3. Inadequate Patch/Vulnerability Management
  4. Security Configuration Intentionally Modified
  5. Vendor Support Ends
  6. Phishing Attack
  7. Third-Party Suppliers
  8. Failure to Implement Regulatory Changes
  9. Failure to Appreciate Value of Emerging Technologies
  10. Unauthorized Access of Information

Latest Security News: NXM Autonomous Security Technology Protects Space Infrastructure and IoT Devices from Cyberattacks

With the online companion course, How to Build a Risk Scenario, practitioners are able to define an IT risk scenario, describe the benefits of using one, summarize the structure of an IT risk scenario, explain the key points for developing an IT risk scenario, and describe the importance of the risk scenario technique. Attendees will receive 1 continuing professional education (CPE) credit.

“Using risk scenarios to overcome the challenge of identifying important and relevant risk brings realism, insight, organizational engagement, improved analysis and structure to the complex matter of IT risk,” says Paul Phillips, ISACA Director of Event Content Development and Risk Professional Practice Lead. “Organizations will benefit from tailoring ISACA’s new risk scenario materials to their specific contexts.”

Latest Security News: Frost & Sullivan Awards Radiflow as Product Leader for OT Risk Assessment and Management for the Power Industry

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Red Sift Launches Suite of Interoperable Applications for Enhanced Cyber Resilience

Business Wire

UL Launches SafeCyber to Secure Connected Devices Around the Globe

CIO Influence News Desk

VicOne Partners with Delta Electronics to Secure EV Charging Infrastructure

CIO Influence News Desk

Leave a Comment