The Certified Pro Hub/Advanced Risk Management

  • €199

Advanced InfoSec

  • Course
  • 41 Lessons
  • 90-day access
  • Starts May 16

Contents

Course Motivation
Preview

0.0 Shifting from technical execution to strategic risk management.

Learning Objectives: Background to Risk Management

By the end of this introductory session, learners will be able to:

  • Analyse the Shift in Security Philosophy: Explain the evolution from "perimeter-based defence" to a modern, risk-based approach to security management.

  • Articulate the "Risk-First" Business Case: Justify the need for risk analysis, using industry benchmarks (IBM/Google), to secure executive buy-in and resource allocation.

  • Distinguish Between Frameworks: Identify the role of global security frameworks in providing a standardised "roadmap" for organisational resilience.

  • Define the Strategic Role of Security: Describe how the security function serves as a business enabler—balancing protection with the organisation's strategic objectives and risk appetite.

The Strategic Imperative of the Security Function
Preview
IBM - Motivation for Risk Analysis in CyberSecurity (11 min)
Preview
Google - Security Frameworks (30 min)
Preview
Introduction: The Evolution of Security Management
Preview

1. Introduction to ISO/IEC 27005 and information security risk management

By the end of this module, learners will be able to:

  • Differentiate Between General and Domain-Specific Standards: Contrast the high-level enterprise principles of ISO 31000 with the information-security-specific guidance of ISO 27005.

  • Identify Cognitive Biases in Risk: Explain how human psychology and risk perception influence decision-making, and how standardised frameworks help mitigate these subjective biases.

  • Analyse the ISO 31000 Architecture and outline the relationship among the three pillars of risk management: Principles, Framework, and Process.

  • Select Appropriate Assessment Tools: Evaluate various risk assessment methodologies (referencing IEC 31010) to determine which qualitative or quantitative tools best suit different organisational needs.

  • Map the Standards Ecosystem: Describe how different ISO/IEC frameworks interlock to create a comprehensive risk management environment

Introduction: The Evolution of Risk Management Standardisation
International Standardisation: ISO 31000 versus ISO 27005
The ISO Risk Management and other frameworks
The Psychology of Risk Perception and Decision-Making
The ISO 31000 Architecture: Principles, Framework, and Process
Review of Risk Assessment Methodologies (IEC 31010)
Scope, Context, and Criteria
Leadership, Governance, and Corporate Commitment
Quiz01 - Risk Management [Day01]

2. Information Security Risk Identification, Assessment, and Treatment (ISO/IEC 27005)

Evaluate Information Security Risks: Apply both asset-based (bottom-up) and event-based (top-down) identification methodologies to achieve comprehensive visibility of threats across modern, interconnected IT ecosystems.

Execute the Risk Assessment Workflow: Navigate the multi-phased implementation process outlined in IEC 31010, encompassing context planning, model development, technique application, and analytical validation.

Formulate Objective Consequence Criteria: Construct structured, non-numerical consequence matrices across operational, legal, reputational, and safety domains to determine risk levels and overcome the systemic biases of traditional qualitative heat maps

Establish Risk Governance and Ownership: Identify and empower definitive risk owners who hold the appropriate business accountability, executive authority, and financial leverage to approve treatment plans and accept residual risk.

Architect Risk Treatment Strategies: Develop actionable Risk Treatment Plans (RTP) and Statements of Applicability (SoA) by mapping required preventive, detective, and corrective controls to ISO/IEC 27001 Annex A, while accounting for the velocity of DevSecOps and cloud-native environments.

Identification and description of information security risks
Identification of risk owners
Assessment of potential consequences
Determination of risk levels
Comparison of risk analysis results with established risk management criteria
Risk prioritization
Determination of required controls for risk treatment
Risk treatment plan
Quiz02 - Risk Identification, Assessment and Treatment [day2]

3 - Risk Acceptance, Communication, Monitoring and Review

The successful operation of an Information Security Management System depends heavily on the auxiliary processes that support core risk assessments. ISO/IEC 27005:2022 formalises these operational requirements within Clause 10, "Leveraging related ISMS processes". This section expands on the four core agenda items that are critical to maintaining a defensible risk posture.

Key Take aways (Module 01 - Module 02)
Quiz03 - Recap - Session 1 & 2
Communication and Consultation of Results
Documentation of the Risk Analysis Process
Documentation of Results
Monitoring of Risk-Generating Factors
Deep Dive: Navigating Complexity with ISO/TS 31050 and the Risk Intelligence Cycle
Future-Looking Challenges for Risk Management and ISO/IEC 27005

4 - Risk Assessment Methodologies

Advanced Analytical Techniques for Modern Information Systems Context: Moving beyond the standard qualitative matrices introduced in Module 2, this module equips participants with specific, specialised frameworks (STRIDE, FMEA, Red Teaming) and structured elicitation techniques required to assess deterministic Cloud risks and highly subjective, probabilistic AI risks.

Lesson Objectives:

  1. Differentiate Analytical Approaches: Select and apply the appropriate methodology (asset-based vs. event-based) based on the specific technological domain and threat landscape.

  2. Execute Cloud Threat Modelling: Systematically deconstruct cloud architectures using the STRIDE framework to identify vulnerabilities before deployment.

  3. Assess Opaque AI Vulnerabilities: Navigate the subjective nature of AI risks (e.g., model drift, bias, hallucinations) using structured expert elicitation and qualitative impact evaluation where historical data is absent.

  4. Integrate Adversarial Findings: Translate the results of specialised testing techniques, such as AI Red Teaming and Failure Modes and Effects Analysis (FMEA), directly into formal, actionable entries in the risk register.

The Methodological Shift: Transcending Traditional Frameworks
Technique 1: STRIDE for Cloud and PaaS Architectures
Technique 2: Subjective Evaluation of Opaque AI Risks
FMEA, Red Teaming, and Risk Register Integration
Risk Monitoring Processes
Part A - Scenarios for Cloud and AI Environments (Practice Lab)
Part B: Procedure to Execute an FMEA Analysis

05 - ISO 27005 Risk Assessment Using FMEA

End-to-End Guide with Worked Examples & Templates

Process Overview - Lab: AI and Cloud Services
Quiz - Simulation exam
Quiz - summary