top of page

WELCOME TO CRONINITY

Home: Welcome

Cyber Risk Concepts - CRISC certification notes - Part 4 - IT Systems

CRISC IT Systems Topic areas: Information Technology Principles Enterprise architecture: Managing and governing the overall structure of an organization's IT systems. IT operations management: Handling the day-to-day IT processes, such as change management, IT asset management, and incident management. Project management: Applying risk management principles throughout the system development life cycle (SDLC). Disaster recovery management (DRM): Creating and maintaining a plan

Cyber Risk Concepts - CRISC certification - Part 3 - Risk Monitoring & Reporting

Moving from Risk Assessment to Risk response & Reporting Once a risk has been identified and assessed, the next step is to ask: What will we do about it? This is where risk treatment or risk response comes into play, selecting the most appropriate action to manage the risk. Risk Response Risk and Control Ownership: Assigning accountability for risks and the controls that address them. Risk Treatment/Response Options: Deciding on the appropriate strategy for addressing ident

Cyber Risk Concepts - CRISC certification notes - Part 2 - Risk Assessment

Risk Evaluation & Risk Assessment Once the scope of the risk analysis is clearly defined, the next critical phase is Risk Evaluation. This stage involves assessing the potential risks to the organization's people, assets, and data within the context of the defined system or environment. Risk Evaluation serves as the analytical core of any cyber risk management process. While much of the industry content and discussion around cyber risk tends to focus on this phase, it's impor

Cyber Risk Concepts - CRISC certification - Part 1 - Governance

CRISQ Topic area overview Cyber risk management often feels complex due to the variety of frameworks, terminology, and implementation approaches in circulation. This article serves as a study aid for the Certified in Risk and Information Systems Control (CRISC) certification by breaking down key concepts within a simplified, practical risk management framework. At a high level, effective risk management can be distilled into four core functions: Risk Governance – Define the m

Microsoft Certs - SC-100 - Overview

The Microsoft SC-100 'Microsoft Certified: Cybersecurity Architect Expert' credential is a Microsoft expert level credential that...

AI Chip Wars

I recently came across a post about the Netherlands passing a stricter espionage law, explicitly extending to cyber activities, and it...

Key Cybersecurity Metric Concepts

The Importance, and Challenge of Cybersecurity Metrics Metrics are foundational to driving and refining business processes, and...

AI - Supply Chain - More on Gas Turbines

What Are Methane Turbines, and Why Are They in the AI Spotlight? Recent headlines about Elon Musk’s xAI "Colossus" data center in...

Home: Blog2

CONTACT

500 Terry Francois Street San Francisco, CA 94158

123-456-7890

  • Facebook
  • Twitter
  • LinkedIn
Home: Contact
  • Facebook
  • Twitter
  • LinkedIn

©2021 by croninity. Proudly created with Wix.com

bottom of page