Risk Management

Risk comes from not knowing what you’re doing e-Learning Course Demos

Risk Management the SecuRetain Way

Instilling a logical, consistent, and disciplined approach to future uncertainties allowing organizations to work prudently and productively, building a resilient and trained workforce to mitigate risks.
risk management course

Empower your organization to comply with Risk and Impact Assessment requirements under FFIEC, ISO 27001, NIST CSF, DPIA, DR

risk management training

Affordable, versatile, and the most extensive Risk Management e-learning courses

risk management certification

Customize Risk Management courses to reflect your desired framework (COSO, OCTAVE, ISO 31000 and more), policies, procedures, and guidelines

frm certification

Use the SecuRetain platform to distribute your training content along with SecuRetain courses in your own private space

risk assessment training

Track progress and course completion for yourself or an entire enterprise with the SecuRetain platform

Ensure that organizations move forward strategically from their current state to their target state with the ability to identify gaps and prioritize those gaps based on risk assessments and mitigation strategies.

Preview e-Learning Courses

Comprehensive Risk Management Based
e-Learning Courses

Beneficial for all organizations, irrespective of their size, industry, and geography. SecuRetain will help organizations and employees grow personally and professionally.

Learning Outcomes from Risk Management Based e-Learning Courses

The best way to predict your future is to create it. Create granular, analytic risk management capabilities.
The versatile knowledge of risk management practices within various frameworks, standards, and compliance requirements will help you design your own approach and predict your own future.

  • Identify risk, assess risk, analyse risk, develop controls, treat risk, etc.
  • Risk management elements, approach, and risk monitoring
  • Vendor/third-party risk assessment, management (TPRM), and framework
  • Cloud-based risk assessment
  • Remote work risks assessment
  • FedRAMP risk management requirement
  • Risk-based cybersecurity framework (NIST CSF)
  • Risk management and frameworks: COSO, ISO 31000, NIST CSF, NIST 800-53, HIPAA, HITRUST
  • Privileged access risks and challenges
  • Fraud and Audit Management Series
  • Fraud risk management framework, fraud risk governance, and insider risk
  • Fraud risk management basics, fraud risk management program, and planning for effective fraud risk assessments
  • Risks covered by Disaster Recovery (DR), DR impact assessments, and risk management
  • Data privacy impact assessments
  • Information technology general controls and risk controls
  • Perform TPRM, common concerns of TPRM, TPRM framework, and driving factors, best practices for a TPRM framework, and framework considerations

SecuRetain’s Risk Management e-Learning Courses

Browse all Risk Management category courses available for you on our SecuRetain platform
To search all courses on our SecuRetain platform. Click here!

Data Privacy and Privacy Regulations (GDPR / CCPA) Part I

  • Course ID: CS00106
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Privacy Imperative
  • Understand Strategic and Tactical Drivers
  • Learn about Privacy Strategy and Privacy Impact
  • Understand the Private Identifiable Information (PII) and Private Health Information
  • (PHI) data
  • Learn about Privacy Impact Assessments
  • Learn about HIPAA and HITECH
  • Learn about GDPR and CCPA
  • Understand the Breach Notification Requirements

Data Privacy and Privacy Regulations (GDPR / CCPA) Part II

  • Course ID: CS00107
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Privacy Imperative
  • Understand Strategic and Tactical Drivers
  • Learn about Privacy Strategy and Privacy Impact
  • Understand the Private Identifiable Information (PII) and Private Health Information
  • (PHI) data
  • Learn about Privacy Impact Assessments
  • Learn about HIPAA and HITECH
  • Learn about GDPR and CCPA
  • Understand the Breach Notification Requirements

Fraud Management Part II

  • Course ID: FR00102
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand Fraud Basics
  • Learn Fraud Risk Management Basics
  • Understand How to Document Roles and Responsibilities
  • Understand the Objectives of Fraud Risk Management Program
  • Learn How to Develop a Fraud Risk Management Program
  • Understand Fraud Risk Management Framework Basics
  • Understand the Importance of Fraud Risk Governance
  • Learn How to Plan for Fraud Risk Assessments
  • Learn About Effective Fraud Risk Assessment Requirements

Fraud Management Part III

  • Course ID: FR00103
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn How to Develop the Fraud Risk Management Program
  • Learn How to Plan for Fraud Risk Assessments
  • Learn How to Execute Fraud Risk Assessments
  • Section I - Fraud Risk Assessment Framework
  • Step 1 - Identify Potential Inherent Fraud Risks
  • Step 2 - Assess the Likelihood and Impact
  • Step 3 - Evaluate Department Likely to Commit Fraud
  • Section II - Analysis
  • Section III - Reporting the Results
  • Understand Fraud Risk Assessment with Practical Examples
  • Learn about Prevention, Detection, and Respond Programs for Fraud
  • Understand Antifraud Strategy Key Elements
  • Learn about Sound Internal Control System Requirements
  • Understand Typical Features of the Practical and User-Friendly Hotline and Whistleblower Program
  • Learn about Investigations Basics, Enforcement, and Corrective Actions

General Data Protection Regulation (GDPR) Part II

  • Course ID: CO00702
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about data Subject Rights
  • Learn about Accountability and Governance principle
  • Understand Privacy by Design
  • Learn about the Data Protection Officer Role
  • Study the privacy Codes of Conduct principle
  • Understand Data Protection Impact Assessments (DPIA)

General Data Protection Regulation (GDPR) Part IV

  • Course ID: CO00704
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand the GDPR articles
  • Learn the 10 steps compliance checklist
  • Study the GDPR implementation approach
  • Learn how to prepare for the project and key concepts
  • Learn about data mapping
  • Study the readiness assessment, gap assessment, and privacy assessment process
  • Learn about data protection by design and by default a key concept
  • Learn to implement data subject rights
  • Understand the Data Protection Impact Assessment (DPIA) Process
  • Learn to amend third-party contracts and review third party procedures
  • Study the different steps to ensure the security of personal and sensitive data
  • Understand how to handle data breaches
  • Study the GDPR compliance audit and training requirement

Health Insurance Portability and Accountability Act (HIPAA) Awareness

  • Course ID: CO00102
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about HITECH and HIPAA compliance
  • The Security Rule, The Privacy Rule, The Breach Notification Rule, Omnibus
  • Rule. Chapter 181, Texas Medical Records Privacy Act
  • Understand How Health Care Privacy Laws affect your organization
  • Understand HIPAA IT Security Risk Assessment
  • Learn about Administrative, Technical and Physical Safeguards
  • Learn about Covered Entities
  • Learn about Use and Disclosure of PHI
  • Understand How HIPAA and HITECH are Related
  • Learn about HITECH and Breach Notification

National Institute of Standards and Technology (NIST) Part I

  • Course ID: CS00501
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about CSF fundamentals
  • Learn how to develop a risk-based cybersecurity framework
  • Understand the CSF framework core and design
  • In-depth knowledge on how to use functions, categories, and subcategories
  • Use of risk management principles, best practices, and methodologies
  • Understand the CSF implementation tiers and implementation
  • Learn about framework profile implementation
  • Learn about improving resilience

Risk Assessment Awareness Part I

  • Course ID: RM00103
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Risk Identification – Learn to identify risk
  • Risk Assessment - How to assess risk?
  • Risk Analysis – How to analyze risk?
  • Controls – Learn to develop controls
  • Risk Treatment – How to treat risk?
  • Risk Management Elements – What are the risk management elements?
  • Risk Monitoring – How to monitor risk?
  • Risk Management Approach – Learn the process?
  • Issue Management Remediation

System & Organization Controls (SOC) Part V

  • Course ID: CO00505
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand what a system description is
  • Understand the driving factors
  • Learn to write system description essentials
  • Learn to write:o System overview
  • Infrastructure details
  • Relevant Aspects of Controls
  • Complementary User-Entity Controls
  • Learn to describe the control environment, risk assessment process, information communication systems, and control monitoring process
  • Learn the step by step approach to the writing system description

System & Organization Controls (SOC) Part VII

  • Course ID: CO00507
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about trust service criteria and SOC reports
  • Learn how trust service criteria is organized
  • Learn how to prepare SOC Trust Service Criteria Control Documentation 
  • Detailed understanding of requirements
  • Learn how to write controls using suggested controls for each service criteria and category
  • Security, Availability, Processing Integrity, Confidentiality, Privacy 
  • Control Environment, Communication and Information, Risk Assessment, Monitoring Activities, Control Activities, Logical and Physical Access Controls, System Operations, Change Management, Risk Mitigation, Additional Criteria for Availability, Additional Criteria for Confidentiality, Additional Criteria for Processing Integrity, Additional Criteria for Privacy
  • Study the real-life example on how to write controls

The Federal Financial Institutions Examination Council (FFIEC) Part I - Awareness

  • Course ID: CO00406
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What is FFIEC?
  • Learn about FFIEC Cybersecurity Priorities
  • Understand FFFIEC CAT Inherent Risk Profile Assessment Categories
  • Understand FFIEC Risk Levels• Learn about Inherent Risk Categories and Ratings
  • Understand in detail the FFIEC CAT Maturity Assessment Categories
  • Domain 1: Cyber Risk Management and Oversight
  • Domain 2: Threat Intelligence and Collaboration
  • Domain 3: Cybersecurity Controls
  • Domain 4: External Dependency Management
  • Domain 5: Cyber Incident Management and Resilience Domains, Assessment
  • Factors, Components, and Declaration

The Federal Financial Institutions Examination Council (FFIEC) Part II

  • Course ID: CO00407
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Role of internal audit in FFIEC risk and maturity
  • Understand FFIEC maturity levels
  • Learn on how to interpret and analyze assessment results
  • Complete case study to provide in-depth understanding and application of principles
  • How to calculate risk for technology and connection type
  • How to create rating summary
  • Learn how to create an inherent risk profile
  • Understand cybersecurity maturity level calculation
  • Learn to document maturity results based on the maturity input
  • Learn to prepare target maturity and maturity result charts
  • Learn to prepare a chart of components
  • Learn to develop roles and responsibilities of the internal audit function
  • Learn to evaluate the cybersecurity maturity assessment

Vendor (Third Party) Risk Management Part I - Awareness

  • Course ID: RM00101
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What is vendor/third-party risk management (TPRM)?
  • What are third parties?
  • What are the common concerns of TPRM?
  • Why perform a third-party risk assessment?
  • What are the factors driving third-party risk assessment?
  • Why do I need a Third-party Risk Management Framework?
  • Why do I need a TPRM framework?

Vendor (Third Party) Risk Management Part II - Framework Development

  • Course ID: RM00102
  • Duration: 0 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Why do Organizations need a TPRM framework?
  • What are the third-party risk categories and common third-party risks?
  • What are the Best Practices for a TPRM Framework?
  • What are the TPRM Framework Considerations?
  • How to build a TPRM framework?
  • How to implement a TPRM framework?
Copyrights © 2020 All Rights Reserved by SecuRetain.