Security Governance

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Security Governance

1. Information Security Strategy


2. Identifying and Managing Strategic Objectives
3. Organizational Roles and Structure
4. Risk Culture

Security Program Resources


5. Policies, Processes, and Procedures
6. Standards, Guidelines, and Architecture
7. Controls, Metrics, and Assets
8. Risk Ledgers, Vulnerability Assessments, and Insurance oh my!
9. Critical Data, BIA’s, and BC/DR Planning
10. Incident Logs, Audits, & Culture
11. Security Training, Third Party Risk, & LCR Requirements

Risk Governance
12. Risk Management Standards and Frameworks
13. Three Lines of Defense
14. Risk Profile
15. Risk Appetite, Tolerance and Capacity
16. Legal Concerns and Ethics

Risk and Threat Identification


17. Risk Events
18. Risk Analysis
19. Risk Identification
20. Risk Management Workflow
21. Threat Landscape
22. Threat Modeling

Vulnerability Analysis and Risk Scenario Development


23. Vulnerability Analysis
24. Cloud Computing Vulnerabilities
25. Big Data
26. Vulnerability Assessment and Penetration Testing
27. Risk Scenario Development
28. Risk Scenario Tools

IT Risk
Risk Assessment Techniques and Reporting
Risk Register
Risk Analysis Methodologies
Business Impact Analysis
Continuity Objectives
Types of Risk
Key Points To Risk Response
Risk and Control Ownership
Risk Response
3rd Party Risk Management
Managing Issues and Exceptions
Managing Emerging Risk
Security Controls
Security Control Categories
Security Control Functions
Control Objectives and Frameworks
Control Implementation
Control Testing
Risk Treatment Plans
Working With Risk Data
Data Sources
Risk and Control Monitoring Techniques
Risk and Control Reporting Techniques
Key Performance Indicators (KPIs)
Key Risk Indicators (KRIs)
Key Control Indicators (KCIs)
Discovering Networking Basics
Exploring the OSI Model
Digging into LANs
Discussing LAN Cabling
Reviewing LAN Considerations
Exploring WANs
Discussing Network Management
Examining Network Infrastructure Security
Exploring Firewalls
Touring Telephony Applications
Reviewing Network-Based Applications
Exploring Cloud Computing Basics
Discussing Cloud Computing Risks
Examining Virtualization Basics
Managing Mobile Device Security
Reviewing Wireless Networks
Identifying Internet of Things (IoT)
Common Technology Components
IT Asset Management
Job Scheduling and Process Automation
System Interfaces
End-User Computing
Data Governance
Operating Systems
Software Licensing
Source Code Management
Capacity Management
Exploring Data Classification
Covering Encryption Basics
Reviewing Encryption Systems
Diving into Digital Signatures
Touring Cryptographic Applications
Examining Public Key Infrastructure (PKI)
Enterprise Architecture
IT Operations Management
Project Management
Enterprise Resilience
System Development Lifecycle (SDLC)
Emerging Trends in Technology
Information Security Principles
Information Security Concepts
The CIA Triad
Administrative Security Controls
Control Assessment Types
Data Lifecycle Management
Data Privacy
Security Governance
Information Security Strategy
Identifying and Managing Strategic Objectives
Organizational Roles and Structure
Risk Culture
Policies, Processes, and Procedures
Standards, Guidelines, and Architecture
Controls, Metrics, and Assets
Risk Ledgers, Vulnerability Assessments, and Insurance oh my!
Critical Data, BIA’s, and BC/DR Planning
Incident Logs, Audits, & Culture
Security Training, Third Party Risk, & LCR Requirements
Risk Management Standards and Frameworks
Three Lines of Defense
Risk Profile
Risk Appetite, Tolerance and Capacity
Legal Concerns and Ethics
Risk Events
Risk Analysis
Risk Identification
Risk Management Workflow
Threat Landscape
Threat Modeling
Vulnerability Analysis
Cloud Computing Vulnerabilities
Big Data
Vulnerability Assessment and Penetration Testing
Risk Scenario Development
Risk Scenario Tools
IT Risk
Risk Assessment Techniques and Reporting
Risk Register
Risk Analysis Methodologies
Business Impact Analysis
Continuity Objectives
Types of Risk
Key Points To Risk Response
Risk and Control Ownership
Risk Response
3rd Party Risk Management
Managing Issues and Exceptions
Managing Emerging Risk
Security Controls
Security Control Categories
Security Control Functions
Control Objectives and Frameworks
Control Implementation
Control Testing
Risk Treatment Plans
Working With Risk Data
Data Sources
Risk and Control Monitoring Techniques
Risk and Control Reporting Techniques
Key Performance Indicators (KPIs)
Key Risk Indicators (KRIs)
Key Control Indicators (KCIs)
Discovering Networking Basics
Exploring the OSI Model
Digging into LANs
Discussing LAN Cabling
Reviewing LAN Considerations
Exploring WANs
Discussing Network Management
Examining Network Infrastructure Security
Exploring Firewalls
Touring Telephony Applications
Reviewing Network-Based Applications
Exploring Cloud Computing Basics
Discussing Cloud Computing Risks
Examining Virtualization Basics
Managing Mobile Device Security
Reviewing Wireless Networks
Identifying Internet of Things (IoT)
Common Technology Components
IT Asset Management
Job Scheduling and Process Automation
System Interfaces
End-User Computing
Data Governance
Operating Systems
Software Licensing
Source Code Management
Capacity Management
Exploring Data Classification
Covering Encryption Basics
Reviewing Encryption Systems
Diving into Digital Signatures
Touring Cryptographic Applications
Examining Public Key Infrastructure (PKI)
Enterprise Architecture
IT Operations Management
Project Management
Enterprise Resilience
System Development Lifecycle (SDLC)
Emerging Trends in Technology
Information Security Principles
Information Security Concepts
The CIA Triad
Administrative Security Controls
Control Assessment Types
Data Lifecycle Management
Data Privacy

You might also like