Certified in Risk and Information Systems Control (CRISC)

Price
$2,037.00 USD

Duration
3 Days

 

Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

The CRISC course is designed for those who have experience with risk identification, assessment, and evaluation; risk response; risk monitoring; information systems control design and implementation; and information systems control monitoring and maintenance.

Course Objectives

  • Identify the universe of IT risk to contribute to the execution of the IT risk management strategy in support of business objectives and in alignment with the enterprise risk management (ERM) strategy.
  • Analyze and evaluate IT risk to determine the likelihood and impact on business objectives to enable risk-based decision making.
  • Determine risk response options and evaluate their efficiency and effectiveness to manage risk in alignment with business objectives.
  • Continuously monitor and report on IT risk and controls to relevant stakeholders to ensure the continued efficiency and effectiveness of the IT risk management strategy and its alignment to business objectives.

Who Should Attend?

IT risk management professionals with at least 3 years of relevant professional work experience in IT risk and information systems control including:
  • Security Directors/Managers/Consultants
  • Compliance/Risk/Privacy Directors and Managers
  • IT Audit Directors/Managers/Consultants
  • Compliance/Risk/Control Staff
  • Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
  • Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
  • Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
  • Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
  • Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
  • Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.

Learning Credits: Learning Credits can be purchased well in advance of your training date to avoid having to commit to specific courses or dates. Learning Credits allow you to secure your training budget for an entire year while eliminating the administrative headache of paying for individual classes. They can also be redeemed for a full year from the date of purchase. If you have previously purchased a Learning Credit agreement with New Horizons, you may use a portion of your agreement to pay for this class.

If you have questions about Learning Credits, please contact your Account Manager.

Corporate Tech Pass: Our Corporate Tech Pass includes unlimited attendance for a single person, in the following Virtual Instructor Led course types: Microsoft Office, Microsoft Technical, CompTIA, Project Management, SharePoint, ITIL, Certified Ethical Hacker, Certified Hacking Forensics Investigator, Java, Professional Development Courses and more. The full list of eligible course titles can be found at https://www.newhorizons.com/eligible.

If you have questions about our Corporate Tech Pass, please contact your Account Manager.

Course Prerequisites

As part of the CRISC prerequisites, candidates must have a minimum of three years of professional work experience in information systems auditing, control, or security

Agenda

Domain 1: IT Risk Identification

  • Collect and review information, including existing documentation, regarding the organization’s internal and external business and IT environments to identify potential or realized impacts of IT risk to the organization’s business objectives and operations.
  • Identify potential threats and vulnerabilities to the organization’s people, processes and technology to enable IT risk analysis.
  • Develop a comprehensive set of IT risk scenarios based on available information to determine the potential impact to business objectives and operations.
  • Identify key stakeholders for IT risk scenarios to help establish accountability.
  • Establish an IT risk register to help ensure that identified IT risk scenarios are accounted for and incorporated into the enterprise-wide risk profile.
  • Identify risk appetite and tolerance defined by senior leadership and key stakeholders to ensure alignment with business objectives.
  • Collaborate in the development of a risk awareness program, and conduct training to ensure that stakeholders understand risk and to promote a risk-aware culture.

Domain 2: IT Risk Assessment

  • Analyze risk scenarios based on organizational criteria (e.g., organizational structure, policies, standards, technology, architecture, controls) to determine the likelihood and impact of an identified risk.
  • Identify the current state of existing controls and evaluate their effectiveness for IT risk mitigation.
  • Review the results of risk and control analysis to assess any gaps between current and desired states of the IT risk environment.
  • Ensure that risk ownership is assigned at the appropriate level to establish clear lines of accountability.
  • Communicate the results of risk assessments to senior management and appropriate stakeholders to enable riskbased decision making.
  • Update the risk register with the results of the risk assessment.

Domain 3: Risk Response Mitigation

  • Consult with risk owners to select and align recommended risk responses with business objectives and enable informed risk decisions.
  • Consult with, or assist, risk owners on the development of risk action plans to ensure that plans include key elements (e.g., response, cost, target date).
  • Consult on the design and implementation or adjustment of mitigating controls to ensure that the risk is managed to an acceptable level.
  • Ensure that control ownership is assigned to establish clear lines of accountability.
  • Assist control owners in developing control procedures and documentation to enable efficient and effective control execution.
  • Update the risk register to reflect changes in risk and management’s risk response.
  • Validate that risk responses have been executed according to the risk action plans.

Domain 4: Risk and Control Monitoring and Reporting

  • Define and establish key risk indicators (KRIs) and thresholds based on available data, to enable monitoring of changes in risk.
  • Monitor and analyze key risk indicators (KRIs) to identify changes or trends in the IT risk profile.
  • Report on changes or trends related to the IT risk profile to assist management and relevant stakeholders in decision making.
  • Facilitate the identification of metrics and key performance indicators (KPIs) to enable the measurement of control performance.
  • Monitor and analyze key performance indicators (KPIs) to identify changes or trends related to the control environment and determine the efficiency and effectiveness of controls.
  • Review the results of control assessments to determine the effectiveness of the control environment.
  • Report on the performance of, changes to, or trends in the overall risk profile and control environment to relevant stakeholders to enable decision making.
 

Upcoming Class Dates and Times

Dec 4, 5, 6
8:00 AM - 4:00 PM
ENROLL $2,037.00 USD
Mar 3, 4, 5
8:00 AM - 4:00 PM
ENROLL $2,037.00 USD
Jun 2, 3, 4
8:00 AM - 4:00 PM
ENROLL $2,037.00 USD
 



Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
 
Contact Us about Starting Your Business Training Strategy with New Horizons