Education / Course Details

Cyber Risk & Information Security Management

Align cyber risk, governance and assurance to your enterprise risk framework

Buy now
Contact our Learning and Development Team

About this course

This dynamic online course bridges cybersecurity and enterprise risk management, helping you align cyber controls, assurance and governance with your organisation’s risk objectives. Whether you are a cyber professional wanting to engage with risk frameworks, or a risk practitioner expanding into the cyber domain, you will gain clarity and confidence to bring the two worlds together.
Through real-world stories, interactive examples and practical tools, you will learn to design and implement cyber risk management processes that integrate seamlessly with your enterprise risk framework.

Buy now

Course specifics

Audience: Cyber Risk Managers, Information Security Officer / CISO, Enterprise Risk Managers, IT Governance or Compliance Managers

Cost: $770.00 (members), $990.00 (non-members)

Facilitator: The Protecht Group

Format: On-Demand

Time: 5.5 hours of video content

Approximately 6.5 hours total course time

CPD Points: 7

Course Facilitator:
The Protecht Group


Course details

This course covers governance, incident response, metrics, frameworks like ISO 31000 and NIST, and the cultural dimensions of cyber risk. Led by our expert trainers — David Tattam (Chief Research & Content Officer), Michael Howell (Head of Risk Research & Knowledge) and Michael Franklin (Cyber Security Lead) — you’ll leave with a complete toolkit ready to embed effective cyber risk practices across your organisation.

Key topics covered:

1. The Need for Cyber Risk Management

  • Introductory definitions

  • Business, social, dynamic & regulatory drivers

2. Defining Cyber Risk

  • Definitions of risk, cyber risk and information security

  • Components of risk; bow tie introductions

  • How cyber overlaps with privacy, technology and data risks

  • Integrating cyber into an enterprise risk taxonomy

3. Defining Cyber Risk Controls

  • What are controls?

  • Seven treatment methods to manage cyber risk

  • Mapping controls to risk components

  • Use of cyber-control frameworks and standards

  • Compliance vs risk; identifying non-controls

4. Cyber Risk Management Frameworks & Processes

  • Applying ISO 31000 steps to cyber risk

  • Applying an ERM framework to cyber risk

  • Aligning cyber frameworks with enterprise risk management

  • Common risk management processes applied to cyber

5. Cyber Risk Appetite

  • Setting appetite for objectives and risks

  • Risk appetite for cyber and how to use it

6. Cyber Risk Assessment

  • Stages of risk assessment; techniques overview

  • Scoping assessments (enterprise, process or asset)

  • Using bow ties for risk and control understanding

  • Inherent risk, residual risk and control effects

  • Evaluating against risk appetite; writing risk scenarios

  • Aligning cyber-specific methodologies with enterprise risk assessments

7. Measuring Cyber Risk

  • Why measure risk?

  • Common risk measurement methods

  • Qualitative (risk matrices & subjective approaches)

  • Semi-quantitative methods (scoring models for risk and controls)

  • Quantitative measures (risk as a distribution; challenges; simplified linear approach)

  • Data sources: internal and external components of cyber risk

8. Cyber Risk Metrics

  • Purpose of risk metrics; types of metrics

  • Characteristics of good metrics & pitfalls

  • Defining zones & thresholds

  • Using metrics for escalation, reporting & response

  • Metrics for risk vs information-security capability

9. Cyber Controls Management

  • Need for controls assurance; internal vs external assurance

  • Governance vs technical controls

  • Documenting control information; mapping to frameworks

  • Testing vs assessing controls

  • Control-testing process: objectives, design and operating effectiveness

  • Assessing groups of controls; considering automation

  • Applying outcomes of controls-management activities

  • Control library and testing template

10. Cyber Incident & Crisis Management

  • Defining cyber incidents; enterprise incident-management approach

  • Specific distinctions for cyber incident management

11. Issues and Action Management

  • Raising issues: how they are identified, ownership, tracking

  • Linking to risk-management components

  • Action management: tracking, reporting, alignment, dangers when ignored

12. Reporting & Communication

  • Purpose of reporting; main types of reports

  • What to report; stakeholder considerations

  • Collecting data for reports; report examples

13. Integrating with Enterprise Risk Management

  • Benefits of integration; integrating cyber processes within the ERM “house”

  • Managing shifting cyber exposure during “Risk In Change”

  • Cyber compliance; alignment with operational-resilience and third-party-risk management frameworks

14. Responsibilities for Cyber Risk Management

  • Everyone as a risk manager

  • The Three-Lines Model

  • Roles in cyber-risk management; key behaviours supporting a strong risk culture

Learning outcomes:

  • Align Cyber Controls with Enterprise Risk: Gain the expertise to connect cybersecurity activities with your organisation’s risk-management framework, ensuring cyber risk is managed as a business risk rather than purely a technical one.

  • Implement Cyber Risk Management Processes: Develop skills to design, assess and monitor cyber risk processes—from appetite and assessment through to reporting and incident management—so you can embed repeatable practices across your organisation.

  • Drive a Risk-Aware Cyber Culture: Learn how to shift from risk-avoidance to informed risk-taking, empower stakeholders, and provide meaningful assurance and executive-level insight on cyber risk.

View all courses
Buy now