Education / Course Details
Cyber Risk & Information Security Management
Align cyber risk, governance and assurance to your enterprise risk framework
About this course
This dynamic online course bridges cybersecurity and enterprise risk management, helping you align cyber controls, assurance and governance with your organisation’s risk objectives. Whether you are a cyber professional wanting to engage with risk frameworks, or a risk practitioner expanding into the cyber domain, you will gain clarity and confidence to bring the two worlds together.
Through real-world stories, interactive examples and practical tools, you will learn to design and implement cyber risk management processes that integrate seamlessly with your enterprise risk framework.
Course specifics
Audience: Cyber Risk Managers, Information Security Officer / CISO, Enterprise Risk Managers, IT Governance or Compliance Managers
Cost: $770.00 (members), $990.00 (non-members)
Facilitator: The Protecht Group
Format: On-Demand
Time: 5.5 hours of video content
Approximately 6.5 hours total course time
CPD Points: 7
Course Facilitator:
The Protecht Group
Course details
This course covers governance, incident response, metrics, frameworks like ISO 31000 and NIST, and the cultural dimensions of cyber risk. Led by our expert trainers — David Tattam (Chief Research & Content Officer), Michael Howell (Head of Risk Research & Knowledge) and Michael Franklin (Cyber Security Lead) — you’ll leave with a complete toolkit ready to embed effective cyber risk practices across your organisation.
Key topics covered:
1. The Need for Cyber Risk Management
Introductory definitions
Business, social, dynamic & regulatory drivers
2. Defining Cyber Risk
Definitions of risk, cyber risk and information security
Components of risk; bow tie introductions
How cyber overlaps with privacy, technology and data risks
Integrating cyber into an enterprise risk taxonomy
3. Defining Cyber Risk Controls
What are controls?
Seven treatment methods to manage cyber risk
Mapping controls to risk components
Use of cyber-control frameworks and standards
Compliance vs risk; identifying non-controls
4. Cyber Risk Management Frameworks & Processes
Applying ISO 31000 steps to cyber risk
Applying an ERM framework to cyber risk
Aligning cyber frameworks with enterprise risk management
Common risk management processes applied to cyber
5. Cyber Risk Appetite
Setting appetite for objectives and risks
Risk appetite for cyber and how to use it
6. Cyber Risk Assessment
Stages of risk assessment; techniques overview
Scoping assessments (enterprise, process or asset)
Using bow ties for risk and control understanding
Inherent risk, residual risk and control effects
Evaluating against risk appetite; writing risk scenarios
Aligning cyber-specific methodologies with enterprise risk assessments
7. Measuring Cyber Risk
Why measure risk?
Common risk measurement methods
Qualitative (risk matrices & subjective approaches)
Semi-quantitative methods (scoring models for risk and controls)
Quantitative measures (risk as a distribution; challenges; simplified linear approach)
Data sources: internal and external components of cyber risk
8. Cyber Risk Metrics
Purpose of risk metrics; types of metrics
Characteristics of good metrics & pitfalls
Defining zones & thresholds
Using metrics for escalation, reporting & response
Metrics for risk vs information-security capability
9. Cyber Controls Management
Need for controls assurance; internal vs external assurance
Governance vs technical controls
Documenting control information; mapping to frameworks
Testing vs assessing controls
Control-testing process: objectives, design and operating effectiveness
Assessing groups of controls; considering automation
Applying outcomes of controls-management activities
Control library and testing template
10. Cyber Incident & Crisis Management
Defining cyber incidents; enterprise incident-management approach
Specific distinctions for cyber incident management
11. Issues and Action Management
Raising issues: how they are identified, ownership, tracking
Linking to risk-management components
Action management: tracking, reporting, alignment, dangers when ignored
12. Reporting & Communication
Purpose of reporting; main types of reports
What to report; stakeholder considerations
Collecting data for reports; report examples
13. Integrating with Enterprise Risk Management
Benefits of integration; integrating cyber processes within the ERM “house”
Managing shifting cyber exposure during “Risk In Change”
Cyber compliance; alignment with operational-resilience and third-party-risk management frameworks
14. Responsibilities for Cyber Risk Management
Everyone as a risk manager
The Three-Lines Model
Roles in cyber-risk management; key behaviours supporting a strong risk culture
Learning outcomes:
Align Cyber Controls with Enterprise Risk: Gain the expertise to connect cybersecurity activities with your organisation’s risk-management framework, ensuring cyber risk is managed as a business risk rather than purely a technical one.
Implement Cyber Risk Management Processes: Develop skills to design, assess and monitor cyber risk processes—from appetite and assessment through to reporting and incident management—so you can embed repeatable practices across your organisation.
Drive a Risk-Aware Cyber Culture: Learn how to shift from risk-avoidance to informed risk-taking, empower stakeholders, and provide meaningful assurance and executive-level insight on cyber risk.