How to Strengthen Cybersecurity with a Risk Based Approach

You are currently focusing on the certification. Go to program dashboard.
CPE Qualification: GRCA , GRCP
This item qualifies for CPE credit(s) accredited by GRC Certify if you watch it from beginning to end. Credit is automatically tracked to your certifications and recorded on your CPE Transcript.
CPE Qualification: CPE tracking is disabled for your account.
In order to automatically receive CPE credits, you must enable VIP Autopay in your account settings.
As the frequency and severity of cybersecurity events increases, organizations must implement stronger processes for managing critical IT risks, requirements, and resources.
As the frequency and severity of cybersecurity events increases, organizations must implement stronger processes for managing critical IT risks, requirements, and resources.
With organizations of all sizes scrambling to strengthen their defenses, it’s important to recognize that the governance of information security and technology is a tenant of risk management, and is more effective when implemented with a risk-based approach.
Join us on September 15th to learn actionable steps for adopting a risk-based cybersecurity program at your organization.
Steven Minsky, CEO of LogicManager and Author of the RIMS Risk Maturity Model
Like many websites, we use cookies and similar technologies such as session storage and analytics scripts to keep the site running smoothly and understand how visitors interact with our content. These tools may automatically collect technical information, including your device type, IP address, and browsing behavior.
By continuing to use this site, you acknowledge and accept this usage. For more information, please review our Terms of Service and Privacy Policy.
Information & Billing
+1 (602) 234-9278
Principled Performance®, Driving Principled Performance®, Putting Principles Into Practice®, OCEG®, GRC360°®, ActiveLearning®, EventDay® and LeanGRC® are registered trademarks of OCEG®.
Protector Skillset™, Protector Mindset™, Protector Code™, Lines of Accountability™, GRC Professional™, GRCP™, GRC Fundamentals™, GRC Auditor™, GRCA™, GRC Audit Fundamentals™, Data Privacy Fundamentals™, Integrated Data Privacy Professional™, IDPP™, Policy Management Fundamentals™, Integrated Policy Management Professional™, IPMP™, Integrated Audit & Assurance Professional™, IAAP™, Integrated Governance & Oversight Professional™, IGOP™, Integrated Strategy & Performance Professional™, ISPP™, Integrated Risk Management Professional™, IRMP™, Integrated Decision Management Professional™, IDMP™, Integrated Compliance & Ethics Professional™, ICEP™, Integrated Business Continuity Professional™, IBCP™, Integrated Information Security Professional™, IISP™ are trademarks of OCEG®.