Cyber Risk Assessment – Respond to Incidents

Field: Auditing | Delivery Method: Self Study | CPE Hours: 1.5

  Enroll in Course

The number of cyber events continues to increase sharply. This is leading to widespread recognition that some cyber events cannot be stopped. Organizations are improving their prevention capabilities with modern technology and tools while augmenting cyber event detection and response capabilities. Previous segments have dissected portions of the NIST cybersecurity framework related to:

  • Identify assets to protect
  • Protect assets
  • Detect threats
The next concept to visit is the respond function. Respond represents the need to develop/implement appropriate activities to take action regarding a detected cybersecurity event. In the past, organizations focused information security efforts on cyber event protection. However, adversaries have modified attack techniques to make protection much more difficult.

Respond and recovery brings together numerous processes and activities, such as business continuity and disaster recovery planning and plan execution. The respond function supports the ability to contain the impact of a potential cybersecurity event. This segment will delve deeply into concepts that must be well understood and planned in order to ensure the respond function is effective.

Learning objectives
  • Explore the requirements of the respond function.
  • Identify critical concepts of response planning.
  • Identify important components of communication in the response phase.
  • Identify how to properly “analyze” for the response phase.
  • Explore steps to instill improvements as part of the response phase.
  • Examine the importance of mitigation of identified incidents as part of the response phase.

Field: Auditing
CPE: 1.5
Delivery Method: Self-Study
Format: Video





Your Instructor


Lynn Fountain
Lynn Fountain

Consultant, CPA, CGMA, CRMA, MBA, Past Chief Audit Executive

Business Consultant, Trainer, Author


Ms. Fountain has over 40 years of experience spanning public accounting, industry accounting and consulting. Sixteen years of that experience has been in the field of internal audit, risk managment and process improvement. She is well adept to assist your organization evaluate business strategy, perform risk assessments, establish a Sarbanes-Oxley process, synergizing internal audit processes or perform process improvement projects.


As a past corporate executive Lynn has a passion for working with professionals to enhance their processes and provide leading edge education. She has authored and delivered hundreds of training courses for accounting, finance and audit professionals. Her training is filled with not just theory but real world application.


Ms. Fountain has authored three technical publications:

-Leading the Internal Audit Function 

-Raise the Red Flag

-Ethics and the Internal Auditor's political dilemma


Lynn is a recognized leader in the internal audit profession as well as a recognized business professional.  


Ms. Fountain obtained her BSBA from Pittsburg State University and her MBA from Washburn University in Kansas. She has active, current CPA, CGMA, and CRMA credentials.


https://www.lynnfountain.net/


Course Curriculum


  Cyber Risk Assessment – Respond to Incidents
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 7 days and we will give you a full refund.

Get started now!