Sourcing risk
Learn how to identify all sources of ICT risk, trace threats to potential business and IT targets, and assess risk according to the impact on business operations. See what is required for effective threat management in the digital business age.
Building the ICT risk portfolio
Understand how to define the scope for risk management activities based on a complete inventory of IT assets, the business assets they support and their interdependencies. Learn how to prioritize when faced with a growing IT portfolio.
Managing ICT risk
Learn the fundamentals of ICT risk management including creating the risk catalog, categorizing and scoring risks, associating risks to the IT portfolio, and defining and implementing mitigations. Find out how to turn IT risk management into a sustainable process.
Managing 3rd-party ICT risk
Extend your resilience framework to include 3rd party service providers: track dependencies, manage and report on contractual relationships, and identify and avoid vendor lock. See how managing the IT ecosystem is integral to risk management.