Book now with code EOY2025
JDMurray said: What about the differences in the "form and function" of information produced by different RM teams? For example, RM people working in a finance department will produce RM information that is different from the RM people working in a cybersecurity threat intelligence department. An RM person needs to know how to analyze and produce RM information in form and content that is usable by their specialized department.
JDMurray said: How is quantitative versus qualitative data created and used? For example, can you actually quantify the annual likelihood of a (as of yet undiscovered) zero-day exploit successfully impacting an Internet-exposed system? We've all seen the ALE/SLE/ARO math on cert exams, but where do the real numbers come from to plug into those calculations?
scasc said: You will find that the work is varied but this can mean there are interesting and pretty dull parts to it. Only advise I can give is that if you are deemed an SME on the technical side of cyber; and this is your USP, then whenever such projects come they would go to you - risk is a pretty diverse function but you will find that most of the folks in that space are not really techie - mainly GRC/audit type of background. Try using your background to differentiate. Then build relationships with the 1st line as well. CRISC should not be an issue, I passed myself within 3-4 weeks of reviewing the Q&A's. I think everyone I know who has passed has done this.
scasc said:
. Whittled it between CGEIT or ISO 27005 risk assessment.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!