1. Security-Leadership

    • Buy now
    • Learn more
    • Discussions
      Feb 24
  2. Governance, Risk, and Compliance

    • An Analysis of Governance, Risk, and Compliance
    • Activity - Governance and Security Leadership
    • NIST Cybersecurity History with Dr. Ron Ross (10 Min)
    • The Strategic Imperative - Systems Lifecycle Management
    • Activity - Systems Lifecycle Management (Part1)
    • Contracts - Security point of view
    • Activity - SDLC - Part 02
  3. Risk Management

    • The Strategic Evolution of Cybersecurity Risk Management:
    • IBM: Cybersecurity Trends in 2026: Shadow AI, Quantum & Deepfakes (20 min)
    • Activity- Risk Management
    • IBM (9 min) - Cybersecurity Framework
  4. Laws and regulations

    • 101 - Due Care vs. Due Diligence
    • Trans-Border Data Flows and Digital Sovereignty
    • Activity - Laws and regualtions
    • Optional: USA versu EU model
    • Legal Jurisdictions and the Global Regulatory Environment
    • Activity - Digital Forensics
    • Records Management and Employee Monitoring
    • Activity - Legal terminology
  5. Security Operations and BCM

    • YT: How is Software built? (8min)
    • Contingency Management
    • Activity - SecOps - The Sociotechnical Evolution of Cyber Defence
    • The Architectural and Sociological Foundations of Modern Contingency Management
    • Activity - BCM from ISO point of view
    • (optional) Microsoft: Understanding Chaos Engineering (20 min)
  1. Products
  2. Course
  3. Section

Risk Management

  1. Security-Leadership

    • Buy now
    • Learn more
    • Discussions
      Feb 24
  2. Governance, Risk, and Compliance

    • An Analysis of Governance, Risk, and Compliance
    • Activity - Governance and Security Leadership
    • NIST Cybersecurity History with Dr. Ron Ross (10 Min)
    • The Strategic Imperative - Systems Lifecycle Management
    • Activity - Systems Lifecycle Management (Part1)
    • Contracts - Security point of view
    • Activity - SDLC - Part 02
  3. Risk Management

    • The Strategic Evolution of Cybersecurity Risk Management:
    • IBM: Cybersecurity Trends in 2026: Shadow AI, Quantum & Deepfakes (20 min)
    • Activity- Risk Management
    • IBM (9 min) - Cybersecurity Framework
  4. Laws and regulations

    • 101 - Due Care vs. Due Diligence
    • Trans-Border Data Flows and Digital Sovereignty
    • Activity - Laws and regualtions
    • Optional: USA versu EU model
    • Legal Jurisdictions and the Global Regulatory Environment
    • Activity - Digital Forensics
    • Records Management and Employee Monitoring
    • Activity - Legal terminology
  5. Security Operations and BCM

    • YT: How is Software built? (8min)
    • Contingency Management
    • Activity - SecOps - The Sociotechnical Evolution of Cyber Defence
    • The Architectural and Sociological Foundations of Modern Contingency Management
    • Activity - BCM from ISO point of view
    • (optional) Microsoft: Understanding Chaos Engineering (20 min)

4 Lessons
    • The Strategic Evolution of Cybersecurity Risk Management:
    • IBM: Cybersecurity Trends in 2026: Shadow AI, Quantum & Deepfakes (20 min)
    • Activity- Risk Management
    • IBM (9 min) - Cybersecurity Framework