• (+92) 21 38891169
  • info@securic.com.pk
Securic Systems
  • Company
    • About Us
    • Our Team
    • Career
    • Why Securic Systems
  • Services
    • Network Design Review
    • Information Security Policies Review
    • Penetration Testing
    • Source Code review
    • Vulnerability Assessment
    • Advanced Threat Protection
    • Background Screening
  • Solutions
    • Advanced Malware Protection
    • Endpoint Protection
    • Next Generation Firewall
    • SIEM & Log Management
    • Vulnerability Management
  • Trainings
    • Information Security Risk Management
    • Application Security Training
    • Information Security Awareness Training
  • Partners
    • Rapid7
    • Fortinet
    • TrendMicro
    • AlienVault
    • Metasploit
  • Contact Us
  • Company
    • About Us
    • Our Team
    • Career
    • Why Securic Systems
  • Services
    • Network Design Review
    • Information Security Policies Review
    • Penetration Testing
    • Source Code review
    • Vulnerability Assessment
    • Advanced Threat Protection
    • Background Screening
  • Solutions
    • Advanced Malware Protection
    • Endpoint Protection
    • Next Generation Firewall
    • SIEM & Log Management
    • Vulnerability Management
  • Trainings
    • Information Security Risk Management
    • Application Security Training
    • Information Security Awareness Training
  • Partners
    • Rapid7
    • Fortinet
    • TrendMicro
    • AlienVault
    • Metasploit
  • Contact Us
Securic Systems
  • Company
    • About Us
    • Our Team
    • Career
    • Why Securic Systems
  • Services
    • Network Design Review
    • Information Security Policies Review
    • Penetration Testing
    • Source Code review
    • Vulnerability Assessment
    • Advanced Threat Protection
    • Background Screening
  • Solutions
    • Advanced Malware Protection
    • Endpoint Protection
    • Next Generation Firewall
    • SIEM & Log Management
    • Vulnerability Management
  • Trainings
    • Information Security Risk Management
    • Application Security Training
    • Information Security Awareness Training
  • Partners
    • Rapid7
    • Fortinet
    • TrendMicro
    • AlienVault
    • Metasploit
  • Contact Us
  • Company
    • About Us
    • Our Team
    • Career
    • Why Securic Systems
  • Services
    • Network Design Review
    • Information Security Policies Review
    • Penetration Testing
    • Source Code review
    • Vulnerability Assessment
    • Advanced Threat Protection
    • Background Screening
  • Solutions
    • Advanced Malware Protection
    • Endpoint Protection
    • Next Generation Firewall
    • SIEM & Log Management
    • Vulnerability Management
  • Trainings
    • Information Security Risk Management
    • Application Security Training
    • Information Security Awareness Training
  • Partners
    • Rapid7
    • Fortinet
    • TrendMicro
    • AlienVault
    • Metasploit
  • Contact Us

Information Security Risk Management

Information Security Risk Management

November 25, 2017 no responses

Performing Effective

Information Security Risk Management

as per ISO/iec 27005:2011 ISRM Standard

Course Outline:

  • Understanding of key risk management terminologies.
  • What is countermeasure or control and its role in defending against the threat?
  • What is CIA Triad from controls perspective?
  • Different categories of controls (preventive, detective, deterrence etc.)
  • Broader categories of controls (Administrative, Physical and Technical)
  • Defense in depth concept
  • Key information security risk management processes, including context establishment, risk assessment, risk treatment and monitoring/review.
  • What is asset and how its value is determined?
  • Different approaches of Risk Analysis – Qualitative vs. Quantitative
  • Different types of risk responses
  • Determining the right control and factors to consider
  • ‘Hands-on’ practical experience in carrying out an effective risk management program as defined by ISO/IEC 27005:2011.

 

Duration of Course:

  • One full day

 

You Will Learn:

  • Students will learn how to map an organization’s business requirements to implemented security controls.
  • Students will learn the elements of risk assessment and the data necessary for performing an effective risk assessment.
  • Student will learn about different approaches of Risk Analysis – Qualitative vs. Quantitative
  • Students will learn about what in depth risk management models exist for implementing a deeper risk management program in their organization.
Posted in Trainings

Post navigation

Application Security Training
Slider SIEM & Log Management

Get in Touch!

Securic Systems

Head Office:

Suite # 2, Mezzanine Floor, Building 51/C, 21st Commercial Street, Phase 2 Ext., DHA, Karachi.

Email: info@securic.com.pk

(+92) 21 38891169

More About Us!

  • Career
  • About Us
  • Our Team

Why Securic Systems

We offer solutions from leading security products’ vendors. We understand that IT security doesn’t have to be complex in order to be effective.

Read More

© Securic Systems 2025. All Rights Reserved