From the course: IT and Cybersecurity Risk Management Essential Training
Unlock the full course today
Join today to access over 24,000 courses taught by industry experts.
IT risk management techniques
From the course: IT and Cybersecurity Risk Management Essential Training
IT risk management techniques
- [Announcer] As we saw in an earlier lesson, there are four basic it risk treatment techniques, and you can use the acronym, ACAT to remember the four options. First, you can stop or avoid doing the risky thing, or you can use special procedures or safeguards to control the risk, or you can accept the risk. And finally, you can consider transferring or sharing the risk with someone else. Now, let's look more closely at each of these options to better understand what they are and when you should consider using them. Let's start with the avoid option. A simple personal example is avoiding airplane flights, over concerns of hijacking or a crash. But in business, the activity would have to have a high likelihood of occurring and also cause significant financial harm in order to justify avoiding it entirely. Refusing to store credit card data on our systems in order to avoid the cost of protecting it, as well as the liability…
Contents
-
-
-
-
-
(Locked)
Performing the IT risk assessment4m 29s
-
(Locked)
Choosing an IT risk management framework4m 21s
-
(Locked)
Choosing an IT risk management tool2m 48s
-
(Locked)
Determining an acceptable level of IT risk3m 16s
-
(Locked)
Using an IT risk register4m 30s
-
(Locked)
IT risk management techniques6m 39s
-
(Locked)
-
-