Course Overview
Cyber and information security are no longer just technical issues, they are critical business risks that demand enterprise-wide management. This course bridges the gap between cybersecurity frameworks and enterprise risk management, helping you connect your cyber controls, assurance, and governance practices to your broader organisational risk objectives. Whether you’re a cyber leader seeking to align with risk frameworks, or a risk professional expanding into the cyber domain, this course will give you the clarity and confidence to bring the two worlds together.
Through relatable stories, real-world examples, and practical tools, you’ll learn how to design and implement cyber risk management processes that integrate seamlessly with your enterprise risk management framework. We’ll cover the key components of cyber and information security management—from frameworks and governance, to metrics, incident response, and risk appetite—equipping you to provide meaningful assurance and insight to executives and boards.
Our trainers David Tattam – Chief Research & Content Officer, Michael Howell – Head of Risk Research & Knowledge, and Michael Franklin – Cyber Security Lead guide you through Protecht’s approach to managing cyber risk within an enterprise context. You’ll finish with a complete, ready-to-use toolkit to embed effective cyber risk management, align with standards such as ISO 31000 and NIST, and drive a culture of informed risk-taking—not risk avoidance—across your organisation.
Course description
In this course, you'll learn:
1. The Need for Cyber Risk Management- Introductory definitions
- Business drivers
- Social drivers
- Dynamic drivers
- Regulatory drivers
2. Defining Cyber Risk
- Definitions of risk
- Definitions of cyber risk and information security
- Components of risk
- Introduction to risk bow ties
- How cyber overlaps with privacy, technology and data risks
- Integrating cyber into an enterprise risk taxonomy
3. Defining Cyber Risk Controls
- Definition of controls
- 7 treatment methods to manage cyber risk
- How to map controls to components of risk
- The use of cyber-related control frameworks and standards
- Contrasting compliance and risk, and handling controls that aren’t controls
4. Cyber Risk Management Frameworks & Processes
- Applying ISO 31000 steps to cyber risk management
- Applying an Enterprise Risk Management Framework to cyber risk management
- Aligning cyber-specific frameworks to Enterprise Risk Management frameworks
- Common risk management processes applied to cyber
5. Cyber Risk Appetite
- Setting appetite for objectives and risks
- Setting risk appetite for cyber
- How to use risk appetite
6. Cyber Risk Assessment
- Stages of a risk assessment
- An overview of risk assessment techniques
- Scoping the risk assessment – enterprise, process or asset
- Understanding risk and controls using bow ties
- Considering inherent risk, residual risk, and the effect of controls
- Evaluating risk assessment against risk appetite
- Writing risk scenarios
- Aligning cyber specific methodologies with enterprise risk assessment
7. Measuring Cyber Risk
- Why we measure risk
- The common measures of risk
- Main types of risk measurement
- Qualitative measurement
- Risk matrices and subjective approaches
- Challenges with the risk matrix
- Semi-quantitative methods
- Scoring models for risk
- Scoring models for controls
- Challenges and assumptions in scoring models
- Quantitative measures
- Risk as a distribution
- Types of quantitative measures
- Challenges of risk quantification
- A simplified linear quantification approach
- Data sources to measure components of cyber risk
- Internal sources of data
- External sources of data
8. Cyber Risk Metrics
- The purpose of risk metrics
- The types of risk metrics
- Characteristics of good metrics and pitfalls to avoid
- Defining zones and thresholds
- How to use metrics for escalation, reporting and response
- Metrics for risk versus information security capability
9. Cyber Controls Management
- The need for controls assurance
- Distinction between internal assurance and external assurance
- Difference between governance controls and technical controls
- Documenting controls information
- Mapping control frameworks
- Mapping controls you apply to external frameworks and standards
- Challenges and approaches to mapping multiple frameworks
- Control testing versus controls assessment
- A control testing process
- Importance of control objectives
- Assessing design effectiveness
- Assessing operating effectiveness
- Controls assessment over a group of controls
- Considering automated controls
- Applying outcomes of controls management activities
- A Control library and testing template
10. Cyber Incident & Crisis Management
- Defining cyber incidents
- An enterprise approach to incident management
- Distinctions for cyber incident management
11. Issues and Action Management
- Raising issues
- Common ways that issues arise or are identified
- Ownership and tracking
- Linking to other components of risk management
- Action management
- Tracking actions and reporting
- Alignment between systems or reporting mechanisms
- Dangers when actions are ignored
12. Reporting & Communication
- The purpose of reporting
- Main types of reports
- What to report
- Considering stakeholders
- Collecting data for reporting
- Report examples
13. Integrating with Enterprise Risk Management
- Benefits of integration
- Integrating cyber risk processes within the ERMF ‘House’
- Managing shifting cyber exposure during Risk In Change
- Cyber Compliance Management
- Alignment with Operational Resilience framework
- Alignment with Third Party Risk Management
14. Responsibilities for Cyber Risk Management
- Everyone as a risk manager
- The Three Lines Model
- Roles related to cyber risk management
- Key behaviours that support strong risk culture
Course expectations
-
Watch 14 videos
- 7 interactive examples
- Answer 10 quiz questions
- Access 14 downloadable materials
Timings
- 5.5 hours of video content
- Approximately 6.5 hours for the whole course
Cost
-
USD $600 payable by credit card on registration
Next steps
You can purchase this course on-demand via Protecht Academy by credit card.
Please contact Protecht directly if you would like to discuss packages to implement this training across your organisation. Bulk discounts are available and packages can be invoiced in your local currency.
Our trainers
Michael Howell
Head of Risk Research & Knowledge
Michael Howell is Protecht's Head of Risk Research & Knowledge. He is passionate about the field of risk management and related disciplines, with a focus on helping organisations succeed using a ‘decisions eyes wide open’ approach.
Michael is a Certified Practicing Risk Manager whose curiosity drives his approach to challenge the status quo and look for innovative solutions.
David Tattam
GRC Thought Leader
David Tattam is GRC Thought Leader and Co-Founder of Protecht. David's vision is to redefine the way the world thinks about risk and to develop risk management to its rightful place as being a key driver of value creation in each of Protecht's customers.
David is an Associate of the Institute of Chartered Accountants in Australia and New Zealand and a Senior Fellow of the Financial Services Institute of Australia.
Mike Franklin
Cyber Security Lead
Michael Howell
Head of Risk Research & Knowledge
Michael Howell is Protecht's Head of Risk Research & Knowledge. He is passionate about the field of risk management and related disciplines, with a focus on helping organisations succeed using a ‘decisions eyes wide open’ approach.
Michael is a Certified Practicing Risk Manager whose curiosity drives his approach to challenge the status quo and look for innovative solutions. Michael harnesses that curiosity in pursuit of risk knowledge, conducting research and developing content to support and advance risk methodology and product design at Protecht.
Michael’s industry experience includes managing risk functions, assurance programs, policy management, corporate insurance, and compliance.
David Tattam
GRC Thought Leader
David Tattam is GRC Thought Leader and co-founder of Protecht. David's vision is to redefine the way the world thinks about risk and to develop risk management to its rightful place as being a key driver of value creation in each of Protecht's customers.
David has been the driving force in taking Protecht's risk thinking to the frontiers of what is possible in risk management and to support the uplift of people risk capability through training and content.
Prior to Protecht, David was the Chief Risk Officer and Head of Operations for the Australian operations of two global banks. He started his career as a Chartered Accountant and Auditor with Grant Thornton and PwC. He is also the author of A Short Guide to Operational Risk.
David is an Associate of the Institute of Chartered Accountants in Australia and New Zealand and a Senior Fellow of the Financial Services Institute of Australia. He is passionate about risk and risk management and in reaping the value that risk and good risk management can create for any business willing to embrace it.
Mike Franklin
Cyber Security Lead




