The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it. The Certified in Risk and Information Systems Control (CRISC) program, sponsored by ISACA, recognizes a wide range of professionals for their knowledge of enterprise risk and their ability to design, implement, monitor and maintain information systems (IS) controls to mitigate such risk. The CRISC certification is designed for IT professionals who have hands-on experience with risk identification, assessment and evaluation; risk response; risk monitoring; IS control design and implementation; and IS control monitoring and maintenance. The CRISC designation will not only certify professionals who have knowledge and experience identifying and evaluating entity-specific risk, but also aid them in helping enterprises accomplish business objectives by designing, implementing, monitoring and maintaining risk-based, efficient and effective IS controls.
The technical skills and practices that CRISC promotes and evaluates are the building blocks of success in the field. Possessing the CRISC designation demonstrates proficiency and is the basis for measurement in the profession. With a growing demand for professionals possessing risk and control skills, CRISC has positioned itself to be the preferred certification program by individuals and enterprises around the world. CRISC certification signifies commitment to serving an enterprise and the chosen profession with distinction.
There are no pre-requisites.
Who should attend?
IT professionals interested in earning Certified in Risk and Information Systems Controls (CRISC) certification. CRISC is for IT professionals, risk professionals, business analysts, project manager and/or compliance professionals, how to work towards evaluation and mitigation of risk, and who have job experience in the following areas:
- Risk identification, assessment and evaluation
- Risk response and monitoring
- IS control design/monitoring and implementation/maintenance
What will you learn?
This seminar has been designed to prepare Delegates for the CRISC examination by enabling them to supplement their existing knowledge and understanding so as to be better prepared to pass the exam, as defined by ISACA.
Domain 1 - Risk Identification, Assessment and Evaluation
Identify, assess and evaluate risk to enable the execution of the enterprise risk management strategy.
Domain 1—Task Statements:
- 1.1 Collect information and review documentation to ensure that risk scenarios are identified and evaluated.
- 1.2 Identify legal, regulatory and contractual requirements and organizational policies and standards related to information systems to determine their potential impact on the business objectives.
- 1.3 Identify potential threats and vulnerabilities for business processes, associated data and supporting capabilities to assist in the evaluation of enterprise risk.
- 1.4 Create and maintain a risk register to ensure that all identified risk factors are accounted for.
- 1.5 Assemble risk scenarios to estimate the likelihood and impact of significant events to the organization.
- 1.6 Analyze risk scenarios to determine their impact on business objectives.
- 1.7 Develop a risk awareness program and conduct training to ensure that stakeholders understand risk and contribute to the risk management process and to promote a risk-aware culture.
- 1.8 Correlate identified risk scenarios to relevant business processes to assist in identifying risk ownership.
- 1.9 Validate risk appetite and tolerance with senior leadership and key stakeholders to ensure alignment
Domain 1—Knowledge Statements:
- 1.1 Knowledge of standards, frameworks and leading practices related to risk identification, assessment and evaluation
- 1.2 Knowledge of techniques for risk identification, classification, assessment and evaluation
- 1.3 Knowledge of quantitative and qualitative risk evaluation methods
- 1.4 Knowledge of business goals and objectives
- 1.5 Knowledge of organizational structures
- 1.6 Knowledge of risk scenarios related to business processes and initiatives
- 1.7 Knowledge of business information criteria
- 1.8 Knowledge of threats and vulnerabilities related to business processes and initiatives
- 1.9 Knowledge of information systems architecture (e.g. platforms, networks, application, databases and operating systems)
- 1.10 Knowledge of information security concepts
- 1.11 Knowledge of threats and vulnerabilities related to third-party management
- 1.12 Knowledge of threats and vulnerabilities related to data management
- 1.13 Knowledge of threats and vulnerabilities related to the system development life cycle
- 1.14 Knowledge of threats and vulnerabilities related to project and program management
- 1.15 Knowledge of threats and vulnerabilities related to business continuity and disaster recovery management
- 1.16 Knowledge of threats and vulnerabilities related to management of IT operations
- 1.17 Knowledge of the elements of a risk register
- 1.18 Knowledge of risk scenario development tools and techniques
- 1.19 Knowledge of risk awareness training tools and techniques
- 1.20 Knowledge of principles of risk ownership
- 1.21 Knowledge of current and forthcoming laws, regulations and standards
- 1.22 Knowledge of threats and vulnerabilities associated with emerging technologies
Domain 2 - Risk Response
Develop and implement risk responses to ensure that risk factors and events are addressed in a cost-effective manner and in line with business objectives.
Domain 2—Task Statements:
- 2.1 Identify and evaluate risk response options and provide management with information to enable risk response decisions.
- 2.2 Review risk responses with the relevant stakeholders for validation of efficiency, effectiveness and economy.
- 2.3 Apply risk criteria to assist in the development of the risk profile for management approval.
- 2.4 Assist in the development of risk response action plans to address risk factors identified in the organizational risk profile.
- 2.5 Assist in the development of business cases supporting the investment plan to ensure risk responses are aligned with the identified business objectives.
Domain 2—Knowledge Statements:
- 2.1 Knowledge of standards, frameworks and leading practices related to risk response
- 2.2 Knowledge of risk response options
- 2.3 Knowledge of cost-benefit analysis and return on investment (ROI)
- 2.4 Knowledge of risk appetite and tolerance
- 2.5 Knowledge of organizational risk management policies
- 2.6 Knowledge of parameters for risk response selection
- 2.7 Knowledge of project management tools and techniques
- 2.8 Knowledge of portfolio, investment and value management
- 2.9 Knowledge of exception management
- 2.10 Knowledge of residual risk
Domain 3 - Risk Monitoring
Monitor risk and communicate information to the relevant stakeholders to ensure the continued effectiveness of the enterprise’s risk management strategy.
Domain 3—Task Statements:
- 3.1 Collect and validate data that measure key risk indicators (KRIs) to monitor and communicate their status to relevant stakeholders.
- 3.2 Monitor and communicate key risk indicators (KRIs) and management activities to assist relevant stakeholders in their decision-making process.
- 3.3 Facilitate independent risk assessments and risk management process reviews to ensure they are performed efficiently and effectively.
- 3.4 Identify and report on risk, including compliance, to initiate corrective action and meet business and regulatory requirements.
Domain 3—Knowledge Statements:
- 3.1 Knowledge of standards, frameworks and leading practices related to risk monitoring
- 3.2 Knowledge of principles of risk ownership
- 3.3 Knowledge of risk and compliance reporting requirements, tools and techniques
- 3.4 Knowledge of key performance indicator (KPIs) and key risk indicators (KRIs)
- 3.5 Knowledge of risk assessment methodologies
- 3.6 Knowledge of data extraction, validation, aggregation and analysis tools and techniques
- 3.7 Knowledge of various types of reviews of the organization’s risk monitoring process (e.g. internal and external audits, peer reviews, regulatory reviews, quality reviews)