IT Risk Management
This course deals with how IT helps to achieve an appropriate balance between realizing opportunities for gains while minimizing losses. It is an integral part of good management practice and an essential element of good corporate governance. It is an iterative process consisting of steps that, when undertaken in sequence, enable continuous improvement in IT decision-making and facilitate continuous improvement in IT performance.
Objectives & Benefits
IT risk management course covers how to establish an appropriate infrastructure and culture and apply a logical and systematic method of establishing the context, identifying, analyzing, evaluating, treating, monitoring and communicating IT risks associated with any activity, function or process in a way that will enable organizations to minimize losses and maximize gains. At the completion of this course, the participants should be able to :
- Conceptualize organizations risk management within IT processes
- Identify and analyze risks within IT operations and understand the implications to the whole business operation
- Improve IT operation risk level thru the application and implementation of IT risk management methodology and best practices
- Support the attainment of organizational business objectives by providing comprehensive perspective of IT risk management to the executive management of the organization
- Plan to implement tool for identifying, analyzing, eradicating and communicating the risks within the cycle of risk management
- Managers involved and related in the IT operations
- IT staff and executives involved in risk management and business process improvement
- Information technology professionals involved in projects that are concerned, in part, with the automation of business processes
- IT professionals especially from companies regulated to implement risk management and IT risk management such as banks and state-owned enterprises.
- Risk Management Introduction
The segment defines Process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives and deciding what countermeasures
- Risk Management Processes
The participants learn to recognize the following issues in the risk management processes such as:
- Identification and classification of information resources or assets that need protection
- Assess threats and vulnerabilities and the likelihood of their occurrence Identification and classification of information resources or assets that need protection
- Assess threats and vulnerabilities and the likelihood of their occurrence
- Risk Indicators
This segment shall describe on the need of IT risk management to operate at multiple levels with diversified risk indicators including:
- Operation: risks that could compromise the effectiveness of IT systems and supporting infrastructure
- Project: risks management needs to focus on the ability to understand and manage project complexity
- Strategic: the risk focus shifts to considerations such as how well the IT capability is aligned with the business strategy
- Loss Event Database
The segment shall describe to the participants on intentional and unintentional action that causes data loss, and highlight on organizational responsibility such as:
- preventing data loss
- recovery from data loss
- Cost of data loss
- Effective Risk Management
This segment shall describe to the participants how to establish effective risk management program that covers:
- Establish purpose of the risk management program
- Assign the responsibility for the risk management
- Risk Management Maturity
This segment shall describe the road-mapping of risk management as related to IT processes; the framework will be based on the CMM maturity level concept.
- IT Risk Management
This segment shall describe on the Information Technology risk management which is part of the organization IT governance encompassing such as: the identification, assessment, and prioritization of IT operation risks, and followed by coordinated and economical application of IT resources to minimize, monitor, and control the probability and/or impact of unfortunate events.
- Cases Study: IT risk management cases
Permintaan Brosur penawaran Training ( Waktu dan Tempat) silahkan Menghubungi kami
- Pelatihan ini dapat di-customized sesuai kebutuhan perusahaan Anda bila diselenggarakan dalam bentuk In-House Training. Untuk permintaan In-House Training dengan jenis topik lainya, silahkan mengirimkan ke alamat email yang tercantum di web kami.
- Request Training. Jika anda membutuhkan informasi pelatihan yang belum tercantum pada website ini, atau anda ingin memberikan usulan materi yang sesuai dengan tingkat kebutuhan perusahaan anda, silahkan mengirimkan ke alamat email yang tercantum.
- Bila tidak ada tanggal dan waktu atau yang tercantum sudah kadaluarsa didalam artikel mohon tanyakan kepada kami untuk jadwal terbarunya.