CRISC - Certified in Risk and Information Systems Control

CRISC - Certified in Risk and Information Systems Control

CRISC Certification  

The attainment of a CRISC Certification has become a competitive advantage both for IS/IT professionals and the enterprises they serve. It establishes the holder’s wide-ranging technical knowledge and ability to apply that knowledge to achieving broader enterprise goals

Officially more than 1,300 CRISC holders are CIOs, CISOs, or  chief compliance, risk or privacy officers and over  600 are CEOs, CFOs or equivalent executives which shows they recognise the CRISC certification.

Since its inception in 2010, more than 20,000 professionals worldwide have earned the CRISC to affirm their business and IT risk management competence, and their ability to design, implement, monitor and maintain effective, risk-based information systems controls.

CRISC Course Outline

CRISC Domain 1 — IT Risk Identification

1.1: Collect and review information, including existing documentation, regarding the organization’s internal and external business and IT environments to identify potential or realized impacts of IT risk to the organization’s business objectives and operations.

1.2: Identify potential threats and vulnerabilities to the organization’s people, processes and technology to enable IT risk analysis.

1.3: Develop a comprehensive set of IT risk scenarios based on available information to determine the potential impact to business objectives and operations.

1.4: Identify key stakeholders for IT risk scenarios to help establish accountability.

1.5: Establish an IT risk register to help ensure that identified IT risk scenarios are accounted for and incorporated into the enterprise-wide risk profile.

1.6: Identify risk appetite and tolerance defined by senior leadership and key stakeholders to ensure alignment with business objectives.

1.7: Collaborate in the development of a risk awareness program, and conduct training to ensure that stakeholders understand risk and to promote a risk-aware culture.

CRISC Domain 2 — IT Risk Assessment

2.1: Analyze risk scenarios based on organizational criteria (e.g., organizational structure, policies, standards, technology, architecture, controls) to determine the likelihood and impact of an identified risk.

2.2: Identify the current state of existing controls and evaluate their effectiveness for IT risk mitigation.

2.3: Review the results of risk and control analysis to assess any gaps between current and desired states of the IT risk environment.

2.4: Ensure that risk ownership is assigned at the appropriate level to establish clear lines of accountability.

2.5: Communicate the results of risk assessments to senior management and appropriate stakeholders to enable risk-based decision making.

2.6: Update the risk register with the results of the risk assessment.

CRISC Domain 3 — Risk Response and Mitigation

3.1: Consult with risk owners to select and align recommended risk responses with business objectives and enable informed risk decisions.

3.2: Consult with, or assist, risk owners on the development of risk action plans to ensure that plans include key elements (e.g., response, cost, target date).

3.3: Consult on the design and implementation or adjustment of mitigating controls to ensure that the risk is managed to an acceptable level.

3.4: Ensure that control ownership is assigned to establish clear lines of accountability.

3.5: Assist control owners in developing control procedures and documentation to enable efficient and effective control execution.

3.6: Update the risk register to reflect changes in risk and management’s risk response.

3.7: Validate that risk responses have been executed according to the risk action plans.

CRISC Domain 4 — Risk and Control Monitoring and Reporting

4.1: Define and establish key risk indicators (KRIs) and thresholds based on available data, to enable monitoring of changes in risk.

4.2: Monitor and analyze key risk indicators (KRIs) to identify changes or trends in the IT risk profile.

4.3: Report on changes or trends related to the IT risk profile to assist management and relevant stakeholders in decision making.

4.4: Facilitate the identification of metrics and key performance indicators (KPIs) to enable the measurement of control performance.

4.5: Monitor and analyze key performance indicators (KPIs) to identify changes or trends related to the control environment and determine the efficiency and effectiveness of controls.

4.6: Review the results of control assessments to determine the effectiveness of the control environment.

4.7: Report on the performance of, changes to, or trends in the overall risk profile and control environment to relevant stakeholders to enable decision making.

Date: Call Us
Duration: 4 Days
Location: DKP - Dubai
Online Price:AED 8995/- + VAT
AED 2000 off for Early Bird Registrations – Limited Time Only
Actual Price: 8995 Discounted Price: AED 6995

CRISC Domain 1 — IT Risk Identification

1.1: Collect and review information, including existing documentation, regarding the organization’s internal and external business and IT environments to identify potential or realized impacts of IT risk to the organization’s business objectives and operations.

1.2: Identify potential threats and vulnerabilities to the organization’s people, processes and technology to enable IT risk analysis.

1.3: Develop a comprehensive set of IT risk scenarios based on available information to determine the potential impact to business objectives and operations.

1.4: Identify key stakeholders for IT risk scenarios to help establish accountability.

1.5: Establish an IT risk register to help ensure that identified IT risk scenarios are accounted for and incorporated into the enterprise-wide risk profile.

1.6: Identify risk appetite and tolerance defined by senior leadership and key stakeholders to ensure alignment with business objectives.

1.7: Collaborate in the development of a risk awareness program, and conduct training to ensure that stakeholders understand risk and to promote a risk-aware culture.

CRISC Domain 2 — IT Risk Assessment

2.1: Analyze risk scenarios based on organizational criteria (e.g., organizational structure, policies, standards, technology, architecture, controls) to determine the likelihood and impact of an identified risk.

2.2: Identify the current state of existing controls and evaluate their effectiveness for IT risk mitigation.

2.3: Review the results of risk and control analysis to assess any gaps between current and desired states of the IT risk environment.

2.4: Ensure that risk ownership is assigned at the appropriate level to establish clear lines of accountability.

2.5: Communicate the results of risk assessments to senior management and appropriate stakeholders to enable risk-based decision making.

2.6: Update the risk register with the results of the risk assessment.

CRISC Domain 3 — Risk Response and Mitigation

3.1: Consult with risk owners to select and align recommended risk responses with business objectives and enable informed risk decisions.

3.2: Consult with, or assist, risk owners on the development of risk action plans to ensure that plans include key elements (e.g., response, cost, target date).

3.3: Consult on the design and implementation or adjustment of mitigating controls to ensure that the risk is managed to an acceptable level.

3.4: Ensure that control ownership is assigned to establish clear lines of accountability.

3.5: Assist control owners in developing control procedures and documentation to enable efficient and effective control execution.

3.6: Update the risk register to reflect changes in risk and management’s risk response.

3.7: Validate that risk responses have been executed according to the risk action plans.

CRISC Domain 4 — Risk and Control Monitoring and Reporting

4.1: Define and establish key risk indicators (KRIs) and thresholds based on available data, to enable monitoring of changes in risk.

4.2: Monitor and analyze key risk indicators (KRIs) to identify changes or trends in the IT risk profile.

4.3: Report on changes or trends related to the IT risk profile to assist management and relevant stakeholders in decision making.

4.4: Facilitate the identification of metrics and key performance indicators (KPIs) to enable the measurement of control performance.

4.5: Monitor and analyze key performance indicators (KPIs) to identify changes or trends related to the control environment and determine the efficiency and effectiveness of controls.

4.6: Review the results of control assessments to determine the effectiveness of the control environment.

4.7: Report on the performance of, changes to, or trends in the overall risk profile and control environment to relevant stakeholders to enable decision making.

With a track record in developing and certifying IT Security & governance  Professionals , there is no doubt this is a world class CRISC course. Our Highly experienced practitioners will break this down into simple to learn modules to help you pass the CRSIC certification 1st time..

What makes us different? 

  • Official KHDA Accredited Training Provider
  • Voted Best Project Management Training Provider - 2017 & 2018 (MEA Business Awards)
  • Voted Leading Project Managment Training Provider - 2018 (Corporate Excellence Award)
  • The guarantee that we don’t compromise on quality; ensuring your decision to invest in your education is sound.