Know your gear
Meeting today's numerous information security regulations is one of the most challenging and complex issues facing corporate IT today. The increased frequency of security incidents, including well-publicized breaches, has resulted in new legislation at both the federal and state level.
Fundamental to meeting these regulations, including the Gramm-Leach-Bliley Act (GLBA), the Health Insurance Portability and Accountability Act (HIPAA), the Federal Information Security Management Act (FISMA), and California SB 1386 are regularly scheduled risk assessments.
Risk assessments, as one component of an effective security program, help organizations protect private information by identifying critical assets, their threats and vulnerabilities to determine risk. From this analysis, organizations can develop security strategies that best minimize risk.
In this course, various frameworks and regulations that apply to IT risk assessments, are presented. Students learn a comprehensive risk assessment methodology as well as
Fundamental to meeting these regulations, including the Gramm-Leach-Bliley Act (GLBA), the Health Insurance Portability and Accountability Act (HIPAA), the Federal Information Security Management Act (FISMA), and California SB 1386 are regularly scheduled risk assessments.
Risk assessments, as one component of an effective security program, help organizations protect private information by identifying critical assets, their threats and vulnerabilities to determine risk. From this analysis, organizations can develop security strategies that best minimize risk.
In this course, various frameworks and regulations that apply to IT risk assessments, are presented. Students learn a comprehensive risk assessment methodology as well as