Course Outline
The curriculum encompasses training objectives, module details, learning hours, and a recommended reading list:
Summary of content:
1. Concepts and framework of information risk management
- The necessity of information risk management (information lifecycle)
- The organizational context of risk
2. Fundamentals of information risk management
- Core information security principles
- Confidentiality, integrity, and availability (CIA)
- Accountability, non-repudiation, authenticity, privacy, secrecy, identification, resilience, and reliability
- Distinctions between information security, cyber security, information risk management, and information assurance
- Standards and best practice guides for information risk management
- The information risk management process
- The four stages: establishing context; risk assessment (identification, analysis, evaluation, and treatment); communication and consultation; and monitoring and review
- Risk management methodologies
- Terminology and definitions in information risk management
- Definitions of threats, hazards, vulnerabilities, proximity, likelihood, probability, and risk
- Strategic risk treatment options: risk avoidance/termination, risk reduction/modification, risk transference/sharing, risk acceptance/tolerance, and risk retention
3. Establishing an information risk management programme
- Requirements for an information risk management programme
- The Plan-Do-Check-Act model (Deming Cycle)
- Developing a strategic approach to information risk management
- Principles of information classification
4. Risk identification
- Process for identifying information assets (tangible and intangible)
- Conducting a business impact analysis
- Conducting threat and vulnerability assessments
5. Risk assessment
- Performing risk analysis
- Differences and appropriate use of qualitative, quantitative, and semi-qualitative risk analysis
- Differences between generic and specific risk analyses
- Construction and utilization of a risk matrix
- Conducting risk evaluation
6. Risk treatment
- Explaining risk treatment options, controls, and processes
- Strategic risk treatment options: risk avoidance/termination, risk reduction/modification, risk transference/sharing, risk acceptance/tolerance, and risk retention
- Purpose of tactical risk treatment controls: prevention, detection, correction, direction, elimination, impact minimization, monitoring and awareness, deterrence, and recovery
- Three types of operational risk treatment controls: procedural/people, physical/environmental, and technical/logical
- Explaining the use of a risk treatment plan
7. Monitor and review
- Explaining information risk monitoring
- Undertaking an information risk review
8. Presenting risks and business case
- Reporting and presenting the progress of a risk management programme
- Presenting a business case
NobleProg is a BCS Accredited Training Provider.
This course is delivered by an expert NobleProg trainer approved by BCS.
The price covers the delivery of the full course syllabus by an approved BCS trainer and the BCS CIRM exam (which can be taken remotely at your convenience and is centrally invigilated by BCS). Upon successfully passing the exam (multiple choice, requiring a minimum score of 65%), participants will receive the accredited BCS Practitioner Certificate in Information Risk Management (CIRM).
Requirements
While there are no formal entry requirements, delegates should possess a foundational understanding of information assurance.
It is beneficial for candidates to be familiar with laws impacting information risk management, such as Data Protection or Freedom of Information regulations. This qualification is tailored for Information Risk Managers and individuals responsible for managing information assets across both public and private sectors.
Testimonials (4)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Risk optimization is more clear than the other subjects
Munirah Alsahli - GOSI
Course - CGEIT – Certified in the Governance of Enterprise IT
The knowledge and understanding of the trainer on the training material was exceptional. The trainer was well aware of the subject, provided practical examples in relevance. I would highly recommend him as a trainer for this training.