Cybersecurity Risk Management - Managing cybersecurity risks, understanding threats, vulnerabilities, and implementing controls
-
Speaker : Kevin R. Thompson
-
When : Wednesday, March 12, 2025
-
Time : 12 : 00 PM EST
-
Add To Calendar
Refer a Friend
Practitioner) and CHSPA (Certified HIPAA Security
Professional), Kevin has a proven track record of leading high-impact
projects across various regulatory landscapes such as HIPAA, SOC,
FEDRAMP, PCI, GDPR, and NIST.
Kevin's career
spans roles as a vCISO Support Manager at Sunstone Secure, where he
directed comprehensive cybersecurity initiatives, and as a GRC/HITRUST
Manager at Cognizant, where he oversaw HITRUST certification and
compliance projects. His proficiency in leveraging AI tools like Google
Gemini and ChatGPT has empowered him to craft robust policies, training
materials, and KPI presentations that align regulatory requirements with
business objectives.
With strong skills in
risk management, policy development, and audit processes, Kevin brings a
wealth of experience in corporate governance, incident response, and
data privacy. His deep understanding of cybersecurity frameworks,
combined with his ability to drive operational efficiency and mitigate
risks, makes him an expert in delivering impactful training and
consultancy in governance and compliance.
Certifications:
- Certified HITRUST CSF Practitioner (CCSFP)
- Certified HIPAA Security Professional Accelerated (CHSPA)
Core Competencies:
- Regulatory Compliance & Risk Management
- Cybersecurity and Data Privacy
- Policy Development & Corporate Governance
- Incident Response & Audit Processes
Cybersecurity Risk Management: Safeguarding Digital Assets
Cybersecurity risk management is the process of identifying, evaluating, and addressing risks associated with cyber threats that could affect an organization's digital infrastructure. This involves understanding vulnerabilities, potential cyberattacks, and data breaches while implementing protective controls to secure critical information and systems. By managing these risks effectively, organizations can ensure the integrity, confidentiality, and availability of data, while maintaining compliance with cybersecurity regulations and standards.
Areas Covered
- Identification and assessment of cybersecurity threats
- Understanding vulnerabilities in digital systems
- Implementing security controls and safeguards
- Risk mitigation strategies for cyberattacks and data breaches
- Compliance with cybersecurity regulations and standards
- Monitoring and responding to cybersecurity incidents
- Developing a cybersecurity risk management framework
- Enhancing organizational resilience against digital threats
Who Should Attend
- Chief Information Security Officer (CISO)
- IT Security Managers
- Cybersecurity Analysts
- Risk Managers
- Compliance Officers
- IT Directors and Managers
- Security Architects
- Network Security Engineers
- Information Security Officers
- Incident Response Managers
- Data Protection Officers
- Systems Administrators
- Security Operations Center (SOC) Analysts
- Vulnerability Managers
- IT Auditors
- Governance, Risk, and Compliance (GRC) Professionals
- Chief Risk Officer (CRO)
- Security Compliance Managers
- Privacy Officers
Topic Background
Cybersecurity Risk Management: Managing Digital Threats
Cybersecurity risk management involves identifying, assessing, and mitigating risks related to digital threats that could compromise an organization’s information systems and data. This process focuses on understanding vulnerabilities, and potential threats such as cyberattacks or data breaches, and implementing controls to safeguard critical assets. Effective cybersecurity risk management ensures that organizations can protect their operations, maintain data integrity, and comply with security regulations.
-
$160.00
-