Тёмный

Master Practical Risk Assessment Techniques Part 2: Step-by-Step Guide 2024 

Prabh Nair
Подписаться 100 тыс.
Просмотров 8 тыс.
50% 1

Welcome to an insightful journey into the world of cybersecurity with Mr. Atul Rishav! In this must-watch video, Mr. Rishav, a seasoned expert in the field, delves deep into the practical aspects of conducting and managing risk assessment
What's Inside:
Linkedin Profile
/ atulrishav
Part 1
• Master Practical Risk ...
Understanding Risk:
Mr. Rishav begins by demystifying what risk really means in the context of information security. He breaks down complex concepts into easy-to-understand elements, making it accessible for everyone from beginners to seasoned professionals.
Risk Assessment Sheet Explained:
Step into the world of professional risk assessment as Mr. Rishav walks you through the process of filling out a risk assessment sheet. This segment is packed with practical tips and real-world examples, ensuring you grasp the nuances of effective risk documentation.
Client Communication: Learn the art of conveying findings to clients. This is crucial, as the way you communicate risks can significantly impact how they are perceived and addressed. Mr. Rishav shares his expert strategies for clear, concise, and impactful communication.
GRC Interview Prep:
If you're gearing up for a Governance, Risk, and Compliance (GRC) interview, this video is a goldmine. Understanding the risk assessment process is key, and Mr. Rishav provides insights that will give you an edge in your interview.
🎯 Who Should Watch:
Aspiring and current cybersecurity professionals
Individuals preparing for GRC interviews
Anyone interested in understanding the practical side of risk assessment in cybersecurity
📈 Takeaways:
By the end of this video, you'll have a solid understanding of risk assessment in the cybersecurity realm. You'll be equipped with the knowledge to effectively fill out risk assessment sheets and communicate your findings with confidence.
👉 Don't forget to like, share, and subscribe for more insightful content like this. Drop your questions or feedback in the comments below - we love hearing from you!
What is internal Audit
• How to Conduct Interna...
Internal Audit Interview Questions
• Mock Job Interview Int...
NIST Part 1
• NIST CSF 2.0 : Real-Wo...
NIST Part 2
• Mastering NIST CSF 2.0...
GRC Foundation
• GRC Practical Approach...
GRC Practical Series
• GRC Practical Approach...
Other Video
• Discover How to Succes...
Playlist of GRC
• GRC Practical Series
Playlist of CISSP
• CISSP Prep (Coffee Shots)
SOC Interview Questions
• SOC Analyst Introducti...
Playlist Network Security
• Network Security
GRC Interview Questions
• Mock Job Interview Int...
Internal Auditor Playlist
• Internal Audit
How to make career progression post #isc2 and #isaca
• How to Make a Career P...
How to make career in GRC
• Learn How to Make an A...
How to Build PIMS
• How to Implement Priva...
How to Implement 27001 in an organization
• Implementing ISO 27001...
How to conduct PIA
• How to Conduct Privacy...
How to Make an career in GRC
• Learn How to Make an A...
Telegram Group
t.me/Prabhstudy
Start your career in cybersecurity with free resources
Cybersecurity Career: How to Make a Career in Cybersecurity 2022 lnkd.in/gCGBnRM7
Pentesting Career
lnkd.in/gQYenKYd
Telegram Group Link
t.me/Prabhstudy
Cybersecurity Guide
• Cybersecurity Guide
Follow me on Instagram
www.instagram.....
#risk #riskassessment #grc #infosec #cybersecurity #isaca #isc2 #grc #itaudit #informationsecurity #thirdpartyriskassessment

Опубликовано:

 

28 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 34   
@SaketBadadal
@SaketBadadal 7 месяцев назад
Great insight! thank you Atul & Prabh.
@haider.mulani
@haider.mulani 6 месяцев назад
Very informative. Thanks
@SomyaJain-i8q
@SomyaJain-i8q 9 месяцев назад
Thanks Atul & Prabh for the informative session! A question- The example you showed for version TLS1.0(I mean using obsolete/vulnerable versions) in network devices. Such kinds of checks would be covered under Vulnerability management as well so shall we consider under Risk register? If yes, which of them shall we consider, shall we filter out with impact and critical vulnerabilities. I hope I made my question clear!
@atulrishav3229
@atulrishav3229 9 месяцев назад
Thanks for watching. This is merely an example of how a known risk should be registered and monitored. For instance, a small company wouldn't even have a vuln mgnt program. In that case an umbrella for "network security" will be created under which known vulns such as TLS would be recorded and tracked periodically. What and how a risk should be registered and monitored is solely dependent on the business and their priorities. Hope that makes sense. Feel free to respond with further queries if needed. Cheers!!
@duamohamed639
@duamohamed639 5 месяцев назад
very informative
@dhanveerck7333
@dhanveerck7333 Месяц назад
Thank you, Prabh & Atul for this wonderful session, one point would like to clarify here about impact after RTP, impact remains same right, how it would become less impact.
@willsausimeworld
@willsausimeworld 3 месяца назад
The template please?
@padmasrig811
@padmasrig811 9 месяцев назад
Vendor management we want to hear next
@atulrishav3229
@atulrishav3229 9 месяцев назад
Noted.
@watchingisfun1835
@watchingisfun1835 4 месяца назад
I am looking the template.
@rudrabhattacharyya891
@rudrabhattacharyya891 29 дней назад
Great insights by Atul , but the examples can be informed and clarification need to get better. It's not very clear. Otherwise it's a great learning session. Thanks 😊
@volvorin6891
@volvorin6891 Месяц назад
Atul you are giving too phaltu type of example to explain the concept.
@capricornn4889
@capricornn4889 3 месяца назад
please share link to download risk register template
@SwatiRana-l3d
@SwatiRana-l3d 27 дней назад
Thank you!
@deepstarn
@deepstarn 4 месяца назад
Hi Atul & Prabh, I am looking to pursue my career into risk management and more of GRC role, also holding ISO 31000 risk management certification and ISO 27001 Lead Auditor ISMS. Are there any workshop conducted where i can nominate myself to be part of any assignment or project you run to get hands on. Please let me know. I have 13 yrs of experience in IT Service Management but would want to switch to risk management now as part of career progression
@nicolasrigo6675
@nicolasrigo6675 2 месяца назад
Great introduction to risk assessment. I rarely got the opportunity to listen to such a practical introduction. Thanks so much for that. I would although expected you to introduce in your example sheet the notion of risk appetite so that you know your residual risk level is within or still outside your appetite after the treatment.
@vipulsharma4u1
@vipulsharma4u1 9 месяцев назад
Thanks for the detailed information on risk management, and it has given me some more areas to consider in risk assessment. However, I think we also have to have risk scoring, or risk rating, such as if an organization has 40+ risks (hypothetically 😊), then we can choose the top ten risks based on the score or we can sort the risk on scale. calculation can be based on likelihood*overall impact, and that can define the overall risk Impact.
@errolabrahams7878
@errolabrahams7878 2 месяца назад
Good presentation. I enjoyed the explanation. Well done:-)
@hanfiachoudhary207
@hanfiachoudhary207 4 месяца назад
Informative and great Insight,Thank you!
@acritesh
@acritesh 3 месяца назад
Thank you prabh and Atul for sharing such insight.
@sandeepgoli6719
@sandeepgoli6719 9 месяцев назад
Hi prabh, how to identify risk in the organization do we have any tools for that.
@VIJAYKARWANDE-b1s
@VIJAYKARWANDE-b1s 8 месяцев назад
Very Informative, Thank you Prabh and Atul
@sathishpannuru1099
@sathishpannuru1099 9 месяцев назад
i would like practical approach...thank you
@Bigg_boss_bytes
@Bigg_boss_bytes 9 месяцев назад
A very informative session. Loved the duo
@bheemmetre7539
@bheemmetre7539 6 месяцев назад
Hi sir do you have live class
@davidmartins7049
@davidmartins7049 9 месяцев назад
Excellent presentation by the panel.
@thkhan
@thkhan 9 месяцев назад
how to get the excel template?
@akahibeoluchi4413
@akahibeoluchi4413 9 месяцев назад
This is very informative, thank you for taking the time to share. Regarding the Risk treatment plan, what tools can one use to conduct Network device assessments in case this is asked in an interview?
@atulrishav3229
@atulrishav3229 9 месяцев назад
There are plethora of open source and paid network scanning tools such as Qualys, Tenable, Nmap, and such. Depending on the business risk appetite and budget, one can choose either open source or a paid tool. Do remember that budgeting also includes people's time as well. It can be performed inhouse or outsourced if not capable.
@akahibeoluchi4413
@akahibeoluchi4413 9 месяцев назад
You are awesome! Thank you so much.
@Champingcom
@Champingcom 5 месяцев назад
Thanks a lot!
@jagadishakarapu8491
@jagadishakarapu8491 9 месяцев назад
IT risk analyst
@vback4238
@vback4238 5 месяцев назад
So thankful for this content!
Далее
FATAL CHASE 😳 😳
00:19
Просмотров 1,3 млн
Офицер, я всё объясню
01:00
Просмотров 3,9 млн
ISO 27001 Risk Assessment: The Ultimate Guide
16:50
Просмотров 57 тыс.
Introduction to Third Party Risk Management
55:28
Просмотров 23 тыс.
How to Conduct Internal Audit Step by Step Process
24:23