Master Practical Risk Assessment Techniques Part 2: Step-by-Step Guide 2024

  Рет қаралды 7,684

Prabh Nair

Prabh Nair

Күн бұрын

Welcome to an insightful journey into the world of cybersecurity with Mr. Atul Rishav! In this must-watch video, Mr. Rishav, a seasoned expert in the field, delves deep into the practical aspects of conducting and managing risk assessment
What's Inside:
Linkedin Profile
/ atulrishav
Part 1
• Master Practical Risk ...
Understanding Risk:
Mr. Rishav begins by demystifying what risk really means in the context of information security. He breaks down complex concepts into easy-to-understand elements, making it accessible for everyone from beginners to seasoned professionals.
Risk Assessment Sheet Explained:
Step into the world of professional risk assessment as Mr. Rishav walks you through the process of filling out a risk assessment sheet. This segment is packed with practical tips and real-world examples, ensuring you grasp the nuances of effective risk documentation.
Client Communication: Learn the art of conveying findings to clients. This is crucial, as the way you communicate risks can significantly impact how they are perceived and addressed. Mr. Rishav shares his expert strategies for clear, concise, and impactful communication.
GRC Interview Prep:
If you're gearing up for a Governance, Risk, and Compliance (GRC) interview, this video is a goldmine. Understanding the risk assessment process is key, and Mr. Rishav provides insights that will give you an edge in your interview.
🎯 Who Should Watch:
Aspiring and current cybersecurity professionals
Individuals preparing for GRC interviews
Anyone interested in understanding the practical side of risk assessment in cybersecurity
📈 Takeaways:
By the end of this video, you'll have a solid understanding of risk assessment in the cybersecurity realm. You'll be equipped with the knowledge to effectively fill out risk assessment sheets and communicate your findings with confidence.
👉 Don't forget to like, share, and subscribe for more insightful content like this. Drop your questions or feedback in the comments below - we love hearing from you!
What is internal Audit
• How to Conduct Interna...
Internal Audit Interview Questions
• Mock Job Interview Int...
NIST Part 1
• NIST CSF 2.0 : Real-Wo...
NIST Part 2
• Mastering NIST CSF 2.0...
GRC Foundation
• GRC Practical Approach...
GRC Practical Series
• GRC Practical Approach...
Other Video
• Discover How to Succes...
Playlist of GRC
• GRC Practical Series
Playlist of CISSP
• CISSP Prep (Coffee Shots)
SOC Interview Questions
• SOC Analyst Introducti...
Playlist Network Security
• Network Security
GRC Interview Questions
• Mock Job Interview Int...
Internal Auditor Playlist
• Internal Audit
How to make career progression post #isc2 and #isaca
• How to Make a Career P...
How to make career in GRC
• Learn How to Make an A...
How to Build PIMS
• How to Implement Priva...
How to Implement 27001 in an organization
• Implementing ISO 27001...
How to conduct PIA
• How to Conduct Privacy...
How to Make an career in GRC
• Learn How to Make an A...
Telegram Group
t.me/Prabhstudy
Start your career in cybersecurity with free resources
Cybersecurity Career: How to Make a Career in Cybersecurity 2022 lnkd.in/gCGBnRM7
Pentesting Career
lnkd.in/gQYenKYd
Telegram Group Link
t.me/Prabhstudy
Cybersecurity Guide
• Cybersecurity Guide
Follow me on Instagram
www.instagram.....
#risk #riskassessment #grc #infosec #cybersecurity #isaca #isc2 #grc #itaudit #informationsecurity #thirdpartyriskassessment

Пікірлер: 34
@nicolasrigo6675
@nicolasrigo6675 2 ай бұрын
Great introduction to risk assessment. I rarely got the opportunity to listen to such a practical introduction. Thanks so much for that. I would although expected you to introduce in your example sheet the notion of risk appetite so that you know your residual risk level is within or still outside your appetite after the treatment.
@SaketBadadal
@SaketBadadal 7 ай бұрын
Great insight! thank you Atul & Prabh.
@rudrabhattacharyya891
@rudrabhattacharyya891 28 күн бұрын
Great insights by Atul , but the examples can be informed and clarification need to get better. It's not very clear. Otherwise it's a great learning session. Thanks 😊
@davidmartins7049
@davidmartins7049 9 ай бұрын
Excellent presentation by the panel.
@errolabrahams7878
@errolabrahams7878 2 ай бұрын
Good presentation. I enjoyed the explanation. Well done:-)
@capricornn4889
@capricornn4889 3 ай бұрын
please share link to download risk register template
@haider.mulani
@haider.mulani 6 ай бұрын
Very informative. Thanks
@vback4238
@vback4238 5 ай бұрын
So thankful for this content!
@SomyaJain-i8q
@SomyaJain-i8q 9 ай бұрын
Thanks Atul & Prabh for the informative session! A question- The example you showed for version TLS1.0(I mean using obsolete/vulnerable versions) in network devices. Such kinds of checks would be covered under Vulnerability management as well so shall we consider under Risk register? If yes, which of them shall we consider, shall we filter out with impact and critical vulnerabilities. I hope I made my question clear!
@atulrishav3229
@atulrishav3229 9 ай бұрын
Thanks for watching. This is merely an example of how a known risk should be registered and monitored. For instance, a small company wouldn't even have a vuln mgnt program. In that case an umbrella for "network security" will be created under which known vulns such as TLS would be recorded and tracked periodically. What and how a risk should be registered and monitored is solely dependent on the business and their priorities. Hope that makes sense. Feel free to respond with further queries if needed. Cheers!!
@sathishpannuru1099
@sathishpannuru1099 9 ай бұрын
i would like practical approach...thank you
@duamohamed639
@duamohamed639 5 ай бұрын
very informative
@willsausimeworld
@willsausimeworld 3 ай бұрын
The template please?
@akahibeoluchi4413
@akahibeoluchi4413 9 ай бұрын
This is very informative, thank you for taking the time to share. Regarding the Risk treatment plan, what tools can one use to conduct Network device assessments in case this is asked in an interview?
@atulrishav3229
@atulrishav3229 9 ай бұрын
There are plethora of open source and paid network scanning tools such as Qualys, Tenable, Nmap, and such. Depending on the business risk appetite and budget, one can choose either open source or a paid tool. Do remember that budgeting also includes people's time as well. It can be performed inhouse or outsourced if not capable.
@akahibeoluchi4413
@akahibeoluchi4413 9 ай бұрын
You are awesome! Thank you so much.
@dhanveerck7333
@dhanveerck7333 Ай бұрын
Thank you, Prabh & Atul for this wonderful session, one point would like to clarify here about impact after RTP, impact remains same right, how it would become less impact.
@thkhan
@thkhan 9 ай бұрын
how to get the excel template?
@watchingisfun1835
@watchingisfun1835 4 ай бұрын
I am looking the template.
@padmasrig811
@padmasrig811 9 ай бұрын
Vendor management we want to hear next
@atulrishav3229
@atulrishav3229 9 ай бұрын
Noted.
@jagadishakarapu8491
@jagadishakarapu8491 9 ай бұрын
IT risk analyst
@volvorin6891
@volvorin6891 Ай бұрын
Atul you are giving too phaltu type of example to explain the concept.
@SwatiRana-l3d
@SwatiRana-l3d 26 күн бұрын
Thank you!
@deepstarn
@deepstarn 4 ай бұрын
Hi Atul & Prabh, I am looking to pursue my career into risk management and more of GRC role, also holding ISO 31000 risk management certification and ISO 27001 Lead Auditor ISMS. Are there any workshop conducted where i can nominate myself to be part of any assignment or project you run to get hands on. Please let me know. I have 13 yrs of experience in IT Service Management but would want to switch to risk management now as part of career progression
@vipulsharma4u1
@vipulsharma4u1 9 ай бұрын
Thanks for the detailed information on risk management, and it has given me some more areas to consider in risk assessment. However, I think we also have to have risk scoring, or risk rating, such as if an organization has 40+ risks (hypothetically 😊), then we can choose the top ten risks based on the score or we can sort the risk on scale. calculation can be based on likelihood*overall impact, and that can define the overall risk Impact.
@acritesh
@acritesh 3 ай бұрын
Thank you prabh and Atul for sharing such insight.
@hanfiachoudhary207
@hanfiachoudhary207 3 ай бұрын
Informative and great Insight,Thank you!
@sandeepgoli6719
@sandeepgoli6719 9 ай бұрын
Hi prabh, how to identify risk in the organization do we have any tools for that.
@VIJAYKARWANDE-b1s
@VIJAYKARWANDE-b1s 8 ай бұрын
Very Informative, Thank you Prabh and Atul
@Bigg_boss_bytes
@Bigg_boss_bytes 8 ай бұрын
A very informative session. Loved the duo
@bheemmetre7539
@bheemmetre7539 6 ай бұрын
Hi sir do you have live class
@Champingcom
@Champingcom 5 ай бұрын
Thanks a lot!
Поветкин заставил себя уважать!
01:00
МИНУС БАЛЛ
Рет қаралды 6 МЛН
🍉😋 #shorts
00:24
Денис Кукояка
Рет қаралды 3,4 МЛН
How Strong is Tin Foil? 💪
00:26
Preston
Рет қаралды 120 МЛН
An Unknown Ending💪
00:49
ISSEI / いっせい
Рет қаралды 55 МЛН
How to Use MITRE ATT&CK Framework Detailed Approach  2022
30:21
Prabh Nair
Рет қаралды 79 М.
Introduction to Third Party Risk Management
55:28
Prabh Nair
Рет қаралды 23 М.
ISO 27001 Risk Assessment: The Ultimate Guide
16:50
URM Consulting
Рет қаралды 57 М.
Top Interview Questions For GRC , Auditor , Consultants  Learners
25:10
NEBOSH IG2 RISK ASSESSMENT | How to prepare | IG2 practical assessment | part 1
14:41
Zeeshan Tanzeem (safety management )
Рет қаралды 12 М.
Important Tips for CISSP Exam Mistakes you must avoid
15:27
Prabh Nair
Рет қаралды 38 М.
Поветкин заставил себя уважать!
01:00
МИНУС БАЛЛ
Рет қаралды 6 МЛН