Risk Management for Cybersecurity and IT Managers [Video]

More Information
  • Understand the foundations of risk management in the cybersecurity and information technology field.
  • Be able to use qualitative risk measurement techniques when discussing networks and projects.
  • Be able to use quantitative risk measurement techniques when discussing networks and projects.
  • Discuss current events in the technology space in relation to risk management decisions

Have you ever wondered why your organization's executives or your manager made a decision to fund or not fund your project? In this course, you will get an inside look at how cybersecurity and information technology (IT) managers determine which projects they will support with funding and which they won't based on a preliminary risk analysis. Over the past two decades, I have worked in the cybersecurity and information technology realm, fighting for my projects to become funded. Early in my career, I didn't understand why certain projects would be funded and executed, while others wouldn't. What I learned, it all came down to risk management by our executives and managers. You will learn the terms used by executives and managers in discussing risk management, and how to apply the concepts of risk management to your networks, systems, and projects. This course is not an operational or tactical course that focuses on how you will secure your networks, but instead focuses on the mindset of managers and teaches you how to think like they do. Once you master these concepts, it is much easier to build your business case for your projects and justify your budgetary needs. This course also includes two case studies of what happens when risk management fails, as demonstrated by the Amazon Web Services outage and Equifax data breach that both occurred in 2017.

Style and Approach

Throughout this course, we will discuss what comprises risk (assets, threats, and vulnerabilities), providing numerous real world examples along the way. We will also cover qualitative and quantitative risk measurements, showing how you can calculate the risk of an uncertainty due to vulnerabilities and threats.

  • You will learn to better understand these scenarios, what caused the outage/breach.
  • Why managers may have made the decisions they did that led up to them.
Course Length 2 hours 8 minutes
ISBN 9781789531992
Date Of Publication 29 May 2018


Jason Dion

Jason Dion, CISSP No. 349867, is a professor at University of Maryland University College with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL. With networking experience dating back to 1992, Jason has been a network engineer, Deputy Director of a Network Operations Center, and an Information Systems Officer for large organizations around the globe.

He holds a Master’s of Science degree in Information Technology with a specialization in Information Assurance, a Master’s of Arts and Religion in Pastoral Counseling, and a Bachelor’s of Science in Human Resources Management. He lives in the greater Washington D.C./Baltimore, Maryland area with his wife and two children.

Frequently bought together: