Training Objectives
This Seminar has been designed to prepare delegates for the CRISC examination by enabling them to supplement their existing knowledge and understanding so as to be better prepare to pass the exam,as defined by ISACA.

Who should Attend
IT professionals interested in earning Certified in Risk and Information Systems Controls (CRISC) certification. CRISC is for IT professionals,risk professionals,business analysts,project manager and/or compliance professional, how work towards evaluation and mitigation of risk, and who have job experience in the following areas.

  • Risk identification,assessment and evaluation
  • Risk response and monitoring and
  • IS control design/monitoring and implementation/maintenance.

Course Syllabus
Our CRISC exam preparation course assist IT Professional to accomplish the following business objectives in their enterprise :

  • Designing,implementing,monitoring & maintaining risk-based,effective IS controls
  • Compliance with regulatory requirements

Also covered are the 5 domains as required by ISACA :

1. Risk Identification Assesment and Evaluation (RI)

Collect information and review documentation to ensure that risk scenarios are  identified and evaluated.

  • Identify legal,regulatory and contractual requirements and organizational policies  and standards related to information system to determine their potential impact on the business objectives.
  • Identify legal,regulatory and contractual requirements and organizational policies  and standards related to information system to determine their potential impact on the business objectives.
  • Identify potential threats and vurnerabilities for business process, associated data and supporting capabilities to

2. Risk Response (RR)

  • Identify and evaluate risk response options and provide management with information to enable risk response decisions.
  • Review Risk Response with the relevant stake holders for validation of efficiency,effectiveness and economy.
  • Apply risk criteria to assist in the development of the risk profile for management approval.
  • Assist in the development of risk response action plans to address risk factors identified in the organizational risk profile.
  • Assist in the development of business cases supporting the investment plan to ensure that risk responses are aligned with the identified business objectives.

3. Risk Monitoring (RM)

  • Collect and Validate data that measure key risk indicators (KRIs) to monitor and communicate their status to relevant stake holders.
  • Monitor and communicate key risk indicators (KRIs) and management activities to assist relevant stake holders in their decision-making process.
  • Facilitate independent risk assessments and risk management process reviews to ensure that they are perfomed efficiently and effectively.
  • Identify and report on risk,including compliance,to initiate corrective action and meet business and regulatory requirements.

4. IS Control Design and Implementation (CD)

  • Interview process owners and review process design documentation to gain an understanding of the business process objectives.
  • Analyze and document business process objectives and design to identify required information system controls
  • Design information systems controls in consultation wth process owners to ensure alignment with business needs and objectives.
  • Facilitate the indetification of resources

5. IS Control Monitoring and Maintenance (MM)

  • Plan,supervise and conduct testing to confirm continuous efficiency and effectiveness of information system controls.
  • Collect information and review documentation to identify information systems control deficiencies.
  • Review information systems policies,standards and procedures to verify that they address the organization’s internal and external requirements.
  • Assess and recommend tools and techniques to automate information systems control verification processes.

[yikes-mailchimp form=”2″]

× Apa yang bisa kami bantu?