Natsar, LLC/Introduction to Cybersecurity Risk Management: A Practical Primer

  • Free

Introduction to Cybersecurity Risk Management: A Practical Primer

  • Course
  • 8 Lessons

Earn Continuing Professional Education (CPE) credits at no cost from Natsar.

Explore the foundational principles of cybersecurity risk management in this informative primer by Josh Moulin, Principal at Natsar. As cyber threats grow more frequent and sophisticated, understanding and managing risks is essential for organizations of all sizes. This video is perfect for cybersecurity professionals, students, and decision-makers looking to strengthen their security posture and mitigate vulnerabilities.

Get started now on this no-cost training and receive a certificate upon completion that can be used for CPEs.

Contents

Module 1 | Introduction to Cybersecurity Risk Management

Introduction to Cybersecurity Risk Management: A Practical Primer Module 1

    Module 2 | The Complex Cybersecurity Environment

    Introduction to Cybersecurity Risk Management: A Practical Primer Module 2

      Module 3 | The Foundation of Cybersecurity - The CIA Triad

      Introduction to Cybersecurity Risk Management: A Practical Primer Module 3

        Module 4 | Understanding How Threats, Vulnerabilities, and Exposures Inform Risk

        Introduction to Cybersecurity Risk Management: A Practical Primer Module 4

          Module 5 | Cybersecurity Vulnerability and Patch Management

          Introduction to Cybersecurity Risk Management: A Practical Primer Module 5

            Module 6 | Assessing Technology and Cybersecurity Risk

            Introduction to Cybersecurity Risk Management: A Practical Primer Module 6

              Module 7 | Risk Management Strategies, Frameworks, and Tools

              Introduction to Cybersecurity Risk Management: A Practical Primer Module 7

                Module 8 | Enterprise Risk Management and Communicating with Executives

                Introduction to Cybersecurity Risk Management A Practical Primer Module 8

                  What You Will Learn

                  In today’s digital landscape, managing cybersecurity risks has become essential for protecting sensitive information, ensuring operational continuity, and safeguarding organizational assets. In this video, Josh Moulin, cybersecurity expert and founder of Natsar, delves into the foundational principles and strategies of effective risk management. Designed for professionals, students, and decision-makers, this lecture provides actionable insights to strengthen your cybersecurity posture.

                  Key topics covered include:

                  The Basics of Cybersecurity Risk Management: Defining risk, understanding its components (threats, vulnerabilities, and exposures), and exploring its importance in modern organizations.

                  The CIA Triad: The CIA Triad (Confidentiality, Integrity, Availability) and how it underpins all risk-based decision-making in cybersecurity.

                  Risk Management Strategies: A practical breakdown of approaches like avoidance, transfer, acceptance, and mitigation.

                  Cyber Hygiene and Best Practices: The role of cyber risk assessments, security controls, vulnerability management, patch management, and basic cyber hygiene in minimizing risk.

                  Tools for Risk Management: How risk registers and POA&Ms (Plan of Action and Milestones) help organizations track and address risks effectively.

                  Real-World Applications: Examples demonstrating how risk management strategies have been successfully applied to mitigate cyber threats.

                  This video emphasizes the importance of proactive planning, continuous evaluation, and strategic decision-making to address the evolving cybersecurity landscape. Whether you’re new to cybersecurity or looking to enhance your expertise, this lecture provides the knowledge and tools needed to effectively manage cyber risks and protect high-value assets.

                  Josh Moulin

                  Meet Your Instructor

                  Josh Moulin

                  MSc., CAWFE, CEH, CFCE, CHFI, CISSP, CNDA, DFCP, GCFA, GCFR, GCIA, GIME, GSEC

                  Josh Moulin is a cybersecurity leader with over 20 years of experience protecting critical systems and advising organizations worldwide. He began his career in law enforcement, where he led a cybercrimes task force and a digital forensics lab, pioneering efforts to combat cyber crime. Later, Josh served as a CIO and CISO in the U.S. nuclear weapons complex and as Senior Vice President of Operations at the Center for Internet Security (CIS), where he collaborated with DHS and CISA to secure U.S. state, local, tribal, territorial (SLTT), and election organizations through the MS-ISAC and EI-ISAC. He also served as an Executive Partner at Gartner, advising federal and military leaders on strategic cybersecurity initiatives.

                  In addition to founding Natsar, LLC, a cybersecurity consulting firm, Josh is adjunct faculty teaching university courses on cybersecurity and digital forensics. With a Master’s in Information Security and Assurance and numerous certifications, Josh’s highly rated courses draw from real-world expertise to equip learners with the tools to navigate today’s complex cybersecurity landscape.

                  You May Also Like

                  • $29.95

                  Risk Register

                  • Download
                  • 1 file
                  • Includes 1 additional product

                  Frequently asked questions

                  You've got questions. We've got answers.

                  Is this really free?

                  Yes! We understand that finding quality CPEs is difficult and can be expensive. We are giving back to the cybersecurity community by providing no-cost continuing education.

                  Do I get a certificate?

                  Absolutely. Once you complete the presentation, you will receive a certificate that can be used to provide evidence of your training when submitted CPEs. The certificate is available immediately upon the completion of the content.

                  Do you offer customized training?

                  We definintely do. Natsar has trained individuals, companies, and organizations across the world in various cybersecurity topics. If you're interested in having us do some training for you, please reach out at [email protected]!