BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Course Overview
The Managing Risk in Information Systems course provides a practical and modern approach to understanding, assessing, and mitigating risks across all components of IT environments—including data, people, processes, and technology. Participants will explore essential risk management principles, learn to develop and implement effective security policies, and apply industry frameworks and compliance. Through hands-on labs and real-world exercises, learners will gain the knowledge and skills to evaluate threats, design mitigation strategies, and strengthen organizational resilience in today’s evolving digital landscape. At the completion of this course, participants will be able to:
- Explain the fundamentals of risk management and its role in organizational security.
- Identify threats, vulnerabilities, and exploits affecting business operations and IT systems.
- Understand and maintain compliance requirements related to information security.
- Develop comprehensive risk management and mitigation plans.
- Define and apply appropriate risk assessment approaches.
- Identify critical assets and activities requiring protection.
- Analyze and prioritize risks and determine suitable mitigation controls.
- Integrate risk assessments with business impact, business continuity, disaster recovery, and incident response planning.
- Translate risk assessment results into actionable mitigation strategies across the organization.
Schedule
Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.
Intended Audience
- IT and security professionals responsible for managing organizational risk.
- Risk managers and auditors seeking to enhance knowledge of information security assessment.
- Compliance officers and business continuity planners.
- Project managers or operational leaders involved in risk evaluation and mitigation.
- Anyone interested in understanding and applying structured information security risk assessment methods.
Prerequisites
- Basic understanding of information security concepts and IT systems.
- Familiarity with organizational processes and business operations.
- Prior experience in IT administration, security, or risk management is recommended but not required.
BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org