Cyber Risk Assessment - Protect Assets

Field: Auditing | Delivery Method: Self Study | CPE Hours: 1.5

This is a multi-part series to assist the participant in evaluating all the necessary components to conducting a cyber risk assessment. The purpose of a cyber risk assessment lies in the objectives of ensuring:

  • Availability
  • Confidentiality
  • Integrity of data
  • Integrity of processing
We utilize the NIST cybersecurity framework to walk through various elements that should be considered with a cyber risk assessment. A previous segment delved into the first function outlined by NIST which is the “Identify” concept. This segment will delve into the” protect” function.

We try to protect our information assets and systems against attack. Protection strategies can be the first line of defense, and breaches usually are a failure of protection strategies. Utilizing the concepts of categories and sub-categories and organization can effectively begin to map out their cyber risk process. The sub-categories of the protect function include:
  • Awareness control
  • Awareness and training
  • Data security
  • Information protection and procedures
  • Maintenance
  • Protective technologies
This segment is dedicated to delving into each of these sub-categories and outlining possible considerations for protecting information and cyber assets.

Lesson Objectives
  • Explore the objectives of a cyber risk management assessment.
  • Explore security control designations.
  • Explore the concept of baseline controls.
  • Identify the requirements of ensuring awareness control within the protect function.
  • Identify the requirements of ensuring awareness and training the protect function.
  • Identify the requirements of ensuring data security within the protect function.
  • Identify the requirements of ensuring information protection and procedures within the protect function.
  • Identify the requirements of ensuring maintenance within the protect function.
  • Identify the requirements of ensuring protective technology within the protect function.

Field: Auditing
CPE: 1.5
Delivery Method: Self-Study
Format: Video

Your Instructor

Lynn Fountain
Lynn Fountain

Consultant, CPA, CGMA, CRMA, MBA, Past Chief Audit Executive

Business Consultant, Trainer, Author

Ms. Fountain has over 40 years of experience spanning public accounting, industry accounting and consulting. Sixteen years of that experience has been in the field of internal audit, risk managment and process improvement. She is well adept to assist your organization evaluate business strategy, perform risk assessments, establish a Sarbanes-Oxley process, synergizing internal audit processes or perform process improvement projects.

As a past corporate executive Lynn has a passion for working with professionals to enhance their processes and provide leading edge education. She has authored and delivered hundreds of training courses for accounting, finance and audit professionals. Her training is filled with not just theory but real world application.

Ms. Fountain has authored three technical publications:

-Leading the Internal Audit Function 

-Raise the Red Flag

-Ethics and the Internal Auditor's political dilemma

Lynn is a recognized leader in the internal audit profession as well as a recognized business professional.  

Ms. Fountain obtained her BSBA from Pittsburg State University and her MBA from Washburn University in Kansas. She has active, current CPA, CGMA, and CRMA credentials.

Frequently Asked Questions

When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Get started now!