Chapter

Risk Management Hub – Page 6

Introduction to Cyber Forensics

This presentation provides an overview of cyber forensics – what is forensics? what is cyber forensics? who uses cyber forensics? what are the skills needed for cyber forensics?

Governance of High Risk Projects

Gain insights into enhancing assurance processes for high-risk government projects, focusing on independent assessments, system integration, and lessons learned.

Risk Analysis using the DuPont model

This whitepaper uses the DuPont Model for risk analysis because this model connects incidents with their potential impact on profitability. To use this model, the reader needs knowledge on accounting and financial reporting, experience with risk scenarios, and how IT is affected.

How Does Visa Secure its Payment System?

This presentation paints a picture of the emerging threats to the worldwide payment processing systems and discusses how a major payment processor – Visa – works to keep its payment network secure from increasingly sophisticated attacks.

Intro to Change Management and SDLC

This presentation discusses change management – definition, significance, types – change management controls, the impact of weak change management controls and best practices in change management along the software development life cycle (SDLC).

Introduction to Information System Risk Management

This paper provides a good overview of IT risk management – what is risk? why is it important to manage risk? how is risk assessed? how is risk managed? what are some common risk management frameworks?

An Introduction to Computer Auditing

This paper provides an overview of computer audit – what are the main activities in conducting a computer audit and what is the role of the computer auditor?

CIO Portal