Plan B Risk Training Program
Beyond basics, our online video courses address the practical fundamentals and theoretical underpinnings for using Plan B Risk calculations and estimations in Information Technology / Cyber Risk Management assessments.
These courses comprise the Full Training and Education Program: Conceptual Basics, and then Intermediate and Advanced Topics in Asset Propensity Risk Operational Design so any company / organization can adopt a proper asset-centric risk management methodology and build a real, robust Risk Program featuring intrinsic asset reactivity to unknown risk i.e. how an individual asset’s performance and throughput rate of change evolves independently over time OR versus (when compared against) other assets’…
The key to asset-centric risk is in understanding YOUR exposures and YOUR business processes and NOT any other external, uncontrollable, unknowable, and unpredictable threat and attack landscapes.
Join us today towards unleashing risk intelligence and operational risk realities to elevate smart IT, technology and security decision-making.
-
-
Introduction to the Plan B Risk Specialists Full Course Training Program
A 10-minute course covering the entire Plan B Risk Training Program: An introduction to Risk, the Plan B Asset Propensity Risk methodology, why it works, and how to transform your risk management programs into using the Plan B Specialists approach and leverage your already existing risk practices, IT control frameworks and compliance artifacts. Focused on demonstrating the SIMPLICITY and POWER of asset-based risk management.
A 10-minute course covering the entire Plan B Risk Training Program: An introduction to Risk, the Plan B Asset Propensity Risk methodology, why it works, and how to transform your risk management programs into using the Plan B Specialists approach and leverage your already existing risk practices, IT control frameworks and compliance artifacts. Focused on demonstrating the SIMPLICITY and POWER of asset-based risk management.
-
-
-
-
Lesson 1: What's Wrong with Risk Management?
Surveying current, predominant risk management methods used in the IT Operations and cyber security industry.
Surveying current, predominant risk management methods used in the IT Operations and cyber security industry.
-
Lesson 2: How to Convert and Transform into an Asset-Based Approach
How to Convert and Transform into an Asset-Based Approach
How to Convert and Transform into an Asset-Based Approach
-