Conducted properly, information security risk assessments provide managers with the feedback needed to
understand threats to corporate assets, determine vulnerabilities of current controls, and select appropriate
safeguards. Performed incorrectly, they can provide the false sense of security that allows potential threats to
develop into disastrous losses of proprietary information, capital, and corporate value.
Based on best practices and approaches detailed in, The Security Risk Assessment Handbook: A
Complete Guide for Performing Security Risk Assessments, Second Edition this course gives you
detailed instruction on how to conduct a risk assessment effectively and efficiently.
Trusted to assess security for leading organizations (Hospitals, Universities, Retailers, Pharmaceuticals) and
government agencies, including CIA, NSA, and NATO, Douglas Landoll unveils the little-known tips, tricks,
and techniques used by savvy security professionals in the field. He details time-tested methods to help you,
This course covers all of the elements of conducting an information security risk assessment from the
statement of work to the final report. Walking you through the process of conducting an effective security
assessment, it provides the tools and up-to-date understanding you need to select the security measures best
suited to your organization.
At the completion of this course attendees will be able to:
- Better negotiate the scope and rigor of security assessments
- Effectively interface with security assessment teams
- Effectively assess any security control (administrative, technical, or physical)
- Gain an improved understanding of final report recommendations
- Deliver insightful comments on draft reports