Certified in Governance, Risk and Compliance (CGRC)

Price: $3,986.00 (ex. GST)
Code: CGRC
Duration: 5 Days
Location: Virtual Classroom (AEST)
Enquire Now
Book Your Course
Clear
    Attendees
    Reset options

Introduction

The Certified in Governance, Risk, and Compliance (CGRC) course is a comprehensive training program designed to equip learners with expert knowledge and skills in managing governance, risk, and compliance within an organization. It covers essential aspects of information security and privacy, addressing the creation and maintenance of a robust risk management program. Through the course, participants learn to understand and implement regulatory and legal requirements, develop strategies for selecting and approving security and privacy controls, and effectively assess and audit these controls.Information security risk management is at the heart of Module 1, providing a foundation for the entire course. The course progresses through practical lessons on defining and categorizing information systems (Module 2), selecting appropriate security measures (Module 3), and implementing these measures (Module 4). Participants also gain proficiency in preparing and conducting assessments and audits (Module 5), authorizing information systems (Module 6), and engaging in continuous monitoring (Module 7) to ensure ongoing compliance and risk mitigation. By the end of the CGRC course, learners will have a thorough understanding of governance, risk management, and compliance practices, equipping them with the competencies needed to safeguard their organizations against evolving threats and to ensure adherence to relevant standards and regulations.

Audience Profile

The Certified in Governance, Risk and Compliance (CGRC) course equips professionals to manage IT risks and compliance.

  • Chief Information Security Officers (CISOs)
  • Risk Management Professionals
  • Compliance Officers
  • IT Auditors
  • Information Security Analysts
  • Governance and Compliance Consultants
  • Data Privacy Managers
  • IT Managers/Directors
  • Security Operations Managers
  • Cybersecurity Advisors
  • Network Security Engineers
  • Systems Administrators with a focus on security
  • Legal professionals specializing in cyber law and IT compliance
  • Chief Technology Officers (CTOs) looking to understand compliance requirements
  • Project Managers overseeing IT security projects
  • Security Architects designing secure IT environments
  • Corporate Security Officers responsible for data protection
  • Incident Response Team members
  • Business Continuity and Disaster Recovery Specialists

Outcomes

Gain expertise in governing, assessing, and ensuring compliance for information security through the CGRC course, focusing on risk management, system scoping, control selection, and continuous monitoring.

  • Understand the foundational elements of an effective information security risk management program, including its processes and relevant regulatory and legal requirements.
  • Define and categorize information systems to align with organizational risk management strategies.
  • Identify, document, and tailor security and privacy controls, and develop a strategy for continuous monitoring and effectiveness evaluation.
  • Implement and document the deployment of selected security and privacy controls within the information system.
  • Prepare for, conduct, and report on the assessment or audit of security and privacy controls, and develop a comprehensive remediation plan.
  • Compile necessary documentation for the authorization or approval process of information systems and assess the associated risks.
  • Authorize or approve information systems based on documented risk assessments and management strategies.
  • Analyze the impact of environmental changes on information systems and adjust monitoring strategies accordingly.
  • Engage in response planning and communication for cyber events, ensuring officials are informed of the organization’s risk posture.
  • Decommission information systems when necessary, following proper procedures and updates to risk management documentation.

Prerequisites

For the Certified in Governance, Risk and Compliance (CGRC) course, the following are the minimum required prerequisites to ensure that participants can successfully undertake the training:

  • A basic understanding of information security concepts and terminology.
  • Familiarity with IT infrastructure and the role of information systems within an organization.
  • Knowledge of fundamental risk management principles and practices.
  • Awareness of common legal and regulatory requirements affecting information security.
  • Ability to comprehend and apply security and privacy controls to various scenarios.
  • Basic project management skills to understand the implementation and monitoring of security measures.
  • Analytical skills to assess and interpret the impact of changes to information systems.
  • Prior exposure to or experience with IT governance is helpful but not mandatory.

No specific technical or advanced IT expertise is required; however, a general background in IT or related fields can facilitate the learning process. This course is designed to build upon these foundations and to equip participants with the specialized knowledge and skills needed for governance, risk, and compliance roles within the IT sector.

Understand the foundation of an organization information security risk management program

  • Principles of information security
  • Risk management frameworks (e.g., National Institute of Standards and Technology (NIST), cyber security framework, Control Objectives for Information and Related Technology (COBIT), International Organization for Standardization (ISO) 27001, International Organization for Standardization (ISO) 31000)
  • System Development Life Cycle (SDLC)
  • Information system boundary requirements
  • Security controls and practices
  • Roles and responsibilities in the authorization/approval process

 

Understand risk management program processes

  • Select program management controls
  • Privacy requirements
  • Determine third-party hosted information systems

 

Understand regulatory and legal requirements

  • Familiarize with governmental, organizational and international regulatory security and privacy requirements (e.g., International Organization for Standardization (ISO) 27001, Federal Information Security Modernization Act (FISMA), Federal Risk and Authorization Management Program (FedRAMP), General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA))
  • Familiarize with other applicable security-related mandates

Define the information system

  • Determine the scope of the information system
  • Describe the architecture (e.g., data flow, internal and external interconnections)
  • Describe information system purpose and functionality

 

Determine categorization of the information system

  • Identify the information types processed, stored or transmitted by the information system
  • Determine the impact level on confidentiality, integrity, and availability for each information type
    (e.g., Federal Information Processing Standards (FIPS) 199, International Organization for Standardization/
    International Electrotechnical Commission (ISO/IEC) 27002, data protection impact assessment)
  • Determine information system categorization and document results

Identify and document baseline and inherited controls

Select and tailor controls to the system

  • Determine applicability of recommended baseline and inherited controls
  • Determine appropriate use of control enhancements (e.g., security practices, overlays, countermeasures)
  • Document control applicability

 

Develop continuous control monitoring strategy (e.g., implementation, timeline, effectiveness)

Review and approve security plan/Information Security Management System (ISMS)

Implement selected controls

  • Determine mandatory configuration settings and verify implementation in accordance with current industry
    standards (e.g., Information Technology Security Guidance ITSG-33 – Annex 3A, Technical Guideline for
    Minimum Security Measures, United States Government Configuration Baseline (USGCB), National Institute of Standards and Technology (NIST) checklists, Security Technical Implementation Guides (STIGs), Center for Internet Security (CIS) benchmarks, General Data Protection Regulation (GDPR))
  • Ensure that implementation of controls is consistent with the organizational architecture and associated
    security and privacy architecture
  • Coordinate implementation of inherited controls with control providers
  • Determine and implement compensating/alternate security controls

 

Document control implementation

  • Document inputs to the planned controls, their expected behavior, and expected outputs or deviations
  • Verify the documented details of the controls meet the purpose, scope and risk profile of the information
    system
  • Obtain and document implementation details from appropriate organization entities (e.g., physical security, personnel security, privacy)

Prepare for assessment/audit

  • Determine assessor/auditor requirements
  • Establish objectives and scope
  • Determine methods and level of effort
  • Determine necessary resources and logistics
  • Collect and review artifacts (e.g., previous assessments/audits, system documentation, policies)
  • Finalize the assessment/audit plan

 

Conduct assessment/audit

  • Collect and document assessment/audit evidence
  • Assess/audit implementation and validate compliance using approved assessment methods
    (e.g., interview, test and examine)

 

Prepare the initial assessment/audit report

  • Analyze assessment/audit results and identify vulnerabilities
  • Propose remediation actions

 

Review initial assessment/audit report and perform remediation actions

  • Determine risk responses
  • Apply remediations
  • Reassess and validate the remediated controls

 

Develop final assessment/audit report

Develop remediation plan

  • Analyze identified residual vulnerabilities or deficiencies
  • Prioritize responses based on risk level
  • Identify resources (e.g. financial, personnel, and technical) and determine the appropriate timeframe/
    schedule required to remediate deficiencies

Compile security and privacy authorization/approval documents

  • Compile required security and privacy documentation to support authorization/approval decision by the
    designated official

 

Determine information system risk

  • Evaluate information system risk
  • Determine risk treatment options (i.e., accept, avoid, transfer, mitigate, share)
  • Determine residual risk

 

Authorize/approve information system

  • Determine terms of authorization/approval

Determine impact of changes to information system and environment

  • Identify potential threat and impact to operation of information system and environment
  • Analyze risk due to proposed changes accounting for organizational risk tolerance
  • Approve and document proposed changes (e.g., Change Control Board (CCB), technical review board)
  • Implement proposed changes
  • Validate changes have been correctly implemented
  • Ensure change management tasks are performed

 

Perform ongoing assessments/audits based on organizational requirements

  • Monitor network, physical and personnel activities (e.g., unauthorized assets, personnel and related activities)
  • Ensure vulnerability scanning activities are performed
  • Review automated logs and alerts for anomalies (e.g., security orchestration, automation and response)

 

Review supply chain risk analysis monitoring activities (e.g., cyber threat reports, agency reports, news reports)

Actively participate in response planning and communication of a cyber event

  • Ensure response activities are coordinated with internal and external stakeholders
  • Update documentation, strategies and tactics incorporating lessons learned

 

Revise monitoring strategies based on changes to industry developments introduced through legal, regulatory, supplier, security and privacy updates

Keep designated officials updated about the risk posture for continuous authorization/approval

  • Determine ongoing information system risk
  • Update risk register, risk treatment and remediation plan

 

Decommission information system

  • Determine information system decommissioning requirements
  • Communicate decommissioning of information system
  • Remove information system from operations

Reviews

There are no reviews yet.

Enquire now

Enquire now

    Cart
    Unfortunately, Your Cart Is Empty
    Please Add Something In Your Cart