<\/div>\n<\/div>\n
[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ custom_margin=\u00bb1px|||||\u00bb][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″]
\n[et_pb_text content_tablet=\u00bb\u00bb]<\/p>\n
Temario<\/h2>\n
Domain 1\u2014Risk Identification, Assessment and Evaluation<\/p>\n
Collect information and review documentation to ensure that risk scenarios are identified and evaluated
\nIdentify legal, regulatory and contractual requirements and organizational policies and standards related to information systems to determine their potential impact on the business objectives.
\nIdentify potential threats and vulnerabilities for business processes, associated data and supporting capabilities to assist in the evaluation of enterprise risk.
\nCreate and maintain a risk register to ensure that all identified risk factors are accounted for.
\nAssemble risk scenarios to estimate the likelihood and impact of significant events to the organization.
\nAnalyze risk scenarios to determine their impact on business objectives.
\nDevelop a risk awareness program and conduct training to ensure that stakeholders understand risk and contribute to the risk management process and to promote a risk-aware culture.
\nCorrelate identified risk scenarios to relevant business processes to assist in identifying risk ownership.
\nValidate risk appetite and tolerance with senior leadership and key stakeholders to ensure alignment
\nDomain 2\u2014Risk Response<\/p>\n
Identify and evaluate risk response options and provide management with information to enable risk response decisions.
\nReview risk responses with the relevant stakeholders for validation of efficiency, effectiveness and economy.
\nApply risk criteria to assist in the development of the risk profile for management approval.
\nAssist in the development of risk response action plans to address risk factors identified in the organizational risk profile.
\nAssist in the development of business cases supporting the investment plan to ensure risk responses are aligned with the identified business objectives.
\nDomain 3\u2014Risk Monitoring<\/p>\n
Collect and validate data that measure key risk indicators (KRIs) to monitor and communicate their status to relevant stakeholders.
\nMonitor and communicate key risk indicators (KRIs) and management activities to assist relevant stakeholders in their decision-making process.
\nFacilitate independent risk assessments and risk management process reviews to ensure they are performed efficiently and effectively.
\nIdentify and report on risk, including compliance, to initiate corrective action and meet business and regulatory requirements.
\nDomain 4\u2014Information Systems Control Design and Implementation<\/p>\n
Interview process owners and review process design documentation to gain an understanding of the business process objectives.
\nAnalyze and document business process objectives and design to identify required information systems controls.
\nDesign information systems controls in consultation with process owners to ensure alignment with business needs and objectives.
\nFacilitate the identification of resources (e.g., people, infrastructure, information, architecture) required to implement and operate information systems controls at an optimal level.
\nMonitor the information systems control design and implementation process to ensure that it is implemented effectively and within time, budget and scope.
\nProvide progress reports on the implementation of information systems controls to inform stakeholders and to ensure that deviations are promptly addressed.
\nTest information systems controls to verify effectiveness and efficiency prior to implementation.
\nImplement information systems controls to mitigate risk.
\nFacilitate the identification of metrics and key performance indicators (KPIs) to enable the measurement of information systems control performance in meeting business objectives.
\nAssess and recommend tools to automate information systems control processes.
\nProvide documentation and training to ensure information systems controls are effectively performed.
\nEnsure all controls are assigned control owners to establish accountability.
\nEstablish control criteria to enable control life cycle management
\nDomain 5\u2014IS Control Monitoring and Maintenance<\/p>\n
Plan, supervise and conduct testing to confirm continuous efficiency and effectiveness of information systems controls.
\nCollect information and review documentation to identify information systems control deficiencies.
\nReview information systems policies, standards and procedures to verify that they address the organization\u2019s internal and external requirements.
\nAssess and recommend tools and techniques to automate information systems control verification processes.
\nEvaluate the current state of information systems processes using a maturity model to identify the gaps between current and targeted process maturity.
\nDetermine the approach to correct information systems control deficiencies and maturity gaps to ensure that deficiencies are appropriately considered and remediated.
\nMaintain sufficient, adequate evidence to support conclusions on the existence and operating effectiveness of information systems controls.
\nProvide information systems control status reporting to relevant stakeholders to enable informed decision making.<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ background_color=\u00bb#032b35″][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″][et_pb_contact_form captcha=\u00bboff\u00bb title=\u00bbSolicita informaci\u00f3n del curso\u00bb submit_button_text=\u00bbSolicitar informaci\u00f3n ahora\u00bb _builder_version=\u00bb4.4.0″ title_text_color=\u00bb#ffffff\u00bb title_font_size=\u00bb30px\u00bb][et_pb_contact_field field_id=\u00bbName\u00bb field_title=\u00bbNombre\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmail\u00bb field_title=\u00bbDirecci\u00f3n de correo electr\u00f3nico\u00bb field_type=\u00bbemail\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmpresa\u00bb field_title=\u00bbEmpresa\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbMessage\u00bb field_title=\u00bbCu\u00e9ntanos un poco sobre tus necesidades\u00bb field_type=\u00bbtext\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″ form_field_text_color=\u00bb#555555″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"
15 horas<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"2880","footnotes":""},"categories":[52,9,11],"tags":[],"class_list":["post-3943","post","type-post","status-publish","format-standard","hentry","category-ciberseguridad","category-cursos","category-cursos-de-it"],"acf":[],"_links":{"self":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/3943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/comments?post=3943"}],"version-history":[{"count":0,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/3943\/revisions"}],"wp:attachment":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/media?parent=3943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/categories?post=3943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/tags?post=3943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}