{"id":11263,"date":"2024-07-08T14:46:02","date_gmt":"2024-07-08T12:46:02","guid":{"rendered":"https:\/\/cyberacademy.altaydagistan.com\/?post_type=mec-events&#038;p=11263"},"modified":"2026-01-16T10:55:55","modified_gmt":"2026-01-16T09:55:55","slug":"cisrm-certified-information-systems-risk-manager","status":"publish","type":"mec-events","link":"http:\/\/acgcyberacademy.fr\/en\/events\/cisrm-certified-information-systems-risk-manager\/","title":{"rendered":"C)ISRM: Certified Information Systems Risk Manager"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"11263\" class=\"elementor elementor-11263\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0c232 e-flex e-con-boxed e-con e-child\" data-id=\"6c0c232\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-42f62ef3 e-flex e-con-boxed e-con e-child\" data-id=\"42f62ef3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b4fad91 elementor-widget elementor-widget-image\" data-id=\"1b4fad91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"359\" height=\"169\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Mile2-logo.jpg\" class=\"attachment-large size-large wp-image-11194\" alt=\"MILE2 ACG CyberAcademy Formation\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Mile2-logo.jpg 359w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Mile2-logo-300x141.jpg 300w\" sizes=\"(max-width: 359px) 100vw, 359px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b0eb856 e-flex e-con-boxed e-con e-child\" data-id=\"5b0eb856\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ad7b056 elementor-widget elementor-widget-heading\" data-id=\"4ad7b056\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Target group<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25da03fa elementor-widget elementor-widget-text-editor\" data-id=\"25da03fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>IS Security Officers<\/li><li>Privacy Officers<\/li><li>Health IS Managers<\/li><li>Risk Mangers<\/li><li>Info Security Managers<\/li><li>Government Employees<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d6e3ac1 e-flex e-con-boxed e-con e-child\" data-id=\"5d6e3ac1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b68c9 elementor-widget elementor-widget-heading\" data-id=\"4d4b68c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Description <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57a3c7d5 elementor-widget elementor-widget-text-editor\" data-id=\"57a3c7d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Mile2's <b>Certified Information Systems Risk Manager, C)ISRM<\/b>, course is made for IT and IS professionals who are involved with all aspects of risk management. First, you will learn to assess a system, then implement risk controls. Finally, you will be able to monitor and maintain risk procedures. With this training, you will be able to identify risks associated with specific industries. After course completion, you will be able to design, implement, monitor and maintain risk-based, efficient and effective IS controls.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71419de5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"71419de5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ca12bed elementor-widget elementor-widget-heading\" data-id=\"1ca12bed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Program<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10905e70 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"10905e70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-hourglass-half\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Duration : 4 days<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8268162 elementor-widget elementor-widget-n-accordion\" data-id=\"8268162\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Module 1: Fundamentals of System and Network Security\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1360\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1360\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> C)ISRM Part I: The Big Picture       <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1360\" class=\"elementor-element elementor-element-4209905 e-con-full e-flex e-con e-child\" data-id=\"4209905\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34ed7555 elementor-widget elementor-widget-text-editor\" data-id=\"34ed7555\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Part 1 Learning Objectives \u00a0\u00a0\u00a0<\/li><li>Topics section \u00a0\u00a0<\/li><li>Overview of Risk Management \u00a0\u00a0\u00a0<\/li><li>Risk and Opportunity Management \u00a0\u00a0\u00a0\u00a0<\/li><li>Responsibility vs. Accountability \u00a0\u00a0<\/li><li>Risk Management , Roles and Responsibilities \u00a0\u00a0\u00a0\u00a0<\/li><li>Relevance of Risk Management Frameworks, Standards and Practices \u00a0\u00a0\u00a0<\/li><li>Frameworks \u00a0\u00a0\u00a0\u00a0<\/li><li>Standards \u00a0\u00a0\u00a0\u00a0<\/li><li>Practices\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0<\/li><li>Relevance of Risk Governance \u00a0\u00a0\u00a0<\/li><li>Overview of Risk Governance \u00a0\u00a0\u00a0\u00a0<\/li><li>Objectives of Risk Governance \u00a0\u00a0<\/li><li>Foundation of Risk Governance \u00a0\u00a0\u00a0<\/li><li>Risk Appetite and Risk Tolerance\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/li><li>Risk Awareness and Communication \u00a0\u00a0\u00a0\u00a0<\/li><li>Key Concepts of Risk Governance \u00a0\u00a0\u00a0\u00a0<\/li><li>Risk Culture\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1361\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1361\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> C)ISRM Part II - Domain 1 Risk Identification Assessment and Evaluation         <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1361\" class=\"elementor-element elementor-element-640b294 e-con-full e-flex e-con e-child\" data-id=\"640b294\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1361\" class=\"elementor-element elementor-element-38b4cae e-flex e-con-boxed e-con e-child\" data-id=\"38b4cae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c90ae00 elementor-widget elementor-widget-text-editor\" data-id=\"6c90ae00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Domain 1 Learning Objectives\u00a0 \u00a0\u00a0\u00a0\u00a0<\/li><li>Task Statements\u00a0 \u00a0\u00a0\u00a0<\/li><li>Knowledge Statements\u00a0 \u00a0\u00a0\u00a0\u00a0<\/li><li>The Process\u00a0 \u00a0\u00a0\u00a0\u00a0<\/li><li>Describing the Business Impact of IT Risk\u00a0 \u00a0\u00a0<\/li><li>IT Risk in the Risk Hierarchy\u00a0 \u00a0\u00a0\u00a0<\/li><li>IT Risk Categories\u00a0 \u00a0\u00a0\u00a0\u00a0<\/li><li>High Level Process Phases\u00a0 \u00a0\u00a0\u00a0\u00a0<\/li><li>Definition of Risk Scenario\u00a0 \u00a0\u00a0\u00a0\u00a0<\/li><li>Risk Scenario Development\u00a0 \u00a0\u00a0\u00a0<\/li><li>Risk Registry &amp; Risk Profile\u00a0 \u00a0\u00a0\u00a0\u00a0<\/li><li>Risk Scenario Components\u00a0 \u00a0\u00a0\u00a0\u00a0<\/li><li>Risk Scenario Development Enablers\u00a0 \u00a0\u00a0\u00a0<\/li><li>Systemic, Contagious or Obscure Risk\u00a0 \u00a0\u00a0<\/li><li>Generic IT Risk Scenarios\u00a0 \u00a0\u00a0\u00a0<\/li><li>Definitions and Examples of Risk Factors\u00a0 \u00a0\u00a0\u00a0<\/li><li>Risk Factors- External Environment\u00a0 \u00a0\u00a0\u00a0\u00a0<\/li><li>Risk Factors- Risk Management Capability\u00a0 \u00a0\u00a0<\/li><li>Risk Factors- IT Capability\u00a0 \u00a0\u00a0<\/li><li>Risk Factors- IT Related Business Capabilities\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0<\/li><li>Methods for Analyzing IT Risk\u00a0 \u00a0\u00a0\u00a0\u00a0<\/li><li>Likelihood and Impact\u00a0 \u00a0\u00a0\u00a0\u00a0<\/li><li>Risk Analysis Output \u00a0\u00a0\u00a0\u00a0<\/li><li>Risk Analysis Methods \u00a0\u00a0<\/li><li>Risk Analysis Methods-Quantitative \u00a0\u00a0\u00a0\u00a0<\/li><li>Risk Analysis Methods-Qualitative \u00a0<\/li><li>Risk Analysis Methods-for HIGH impact risk types \u00a0\u00a0\u00a0\u00a0<\/li><li>Risk Analysis Methods Risk Analysis Methods-Business Impact Analysis (BIA) \u00a0\u00a0\u00a0\u00a0\u00a0<\/li><li>Methods for Assessing IT Risk \u00a0\u00a0\u00a0<\/li><li>Identifying and Assessing IT Risk \u00a0\u00a0\u00a0\u00a0<\/li><li>Adverse Impact of Risk Event Business Impacts From IT Risk \u00a0\u00a0\u00a0\u00a0\u00a0<\/li><li>Business Related IT Risk Types \u00a0\u00a0\u00a0\u00a0<\/li><li>IT Project-Related Risk\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1362\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1362\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> C)ISRM Part II - Domain 1 Risk Identification Assessment and Evaluation Cont.      <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1362\" class=\"elementor-element elementor-element-cf2516c e-con-full e-flex e-con e-child\" data-id=\"cf2516c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1362\" class=\"elementor-element elementor-element-65644bf e-flex e-con-boxed e-con e-child\" data-id=\"65644bf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1362\" class=\"elementor-element elementor-element-7b789cd2 e-flex e-con-boxed e-con e-child\" data-id=\"7b789cd2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-460c11db elementor-widget elementor-widget-text-editor\" data-id=\"460c11db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Risk Components-Inherent Risk\u00a0 \u00a0\u00a0\u00a0\u00a0<\/li><li>Risk Components-Residual Risk\u00a0 \u00a0\u00a0\u00a0<\/li><li>Risk Components-Control Risk\u00a0 \u00a0\u00a0\u00a0\u00a0<\/li><li>Risk Components-Detection Risk\u00a0 \u00a0\u00a0\u00a0\u00a0<\/li><li>Business Risk and Threats Addressed By IT Resources \u00a0\u00a0\u00a0<\/li><li>Identifying and Assessing IT Risk\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0<\/li><li>Methods For Describing IT Risk In Business Terms\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1363\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1363\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> C)ISRM Part II - Domain 2 - Risk Response       <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1363\" class=\"elementor-element elementor-element-b0a0112 e-con-full e-flex e-con e-child\" data-id=\"b0a0112\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1363\" class=\"elementor-element elementor-element-39336508 e-flex e-con-boxed e-con e-child\" data-id=\"39336508\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71291d4a elementor-widget elementor-widget-text-editor\" data-id=\"71291d4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Domain 2 Learning Objectives \u00a0\u00a0\u00a0\u00a0<\/li><li>Task Statements \u00a0\u00a0\u00a0\u00a0<\/li><li>Knowledge Statements<\/li><li>Risk Response Objectives \u00a0\u00a0\u00a0<\/li><li>The Risk Response Process\u00a0 \u00a0\u00a0\u00a0<\/li><li>Risk Response Options \u00a0\u00a0\u00a0\u00a0<\/li><li>Risk Response Parameters \u00a0<\/li><li>Risk Tolerance and Risk Response Options \u00a0<\/li><li>Risk Response Prioritization Options \u00a0<\/li><li>Risk Mitigation Control Type<\/li><li>Risk Response Prioritization Factors \u00a0<\/li><li>Risk Response Tracking, Integration and Implementation \u00a0\u00a0\u00a0\u00a0<\/li><li>Process Phases \u00a0\u00a0<\/li><li>Phase 1-Articulate Risk\u00a0 \u00a0\u00a0<\/li><li>Phase 2-Manage Risk \u00a0<\/li><li>Phase 3-React To Risk Events\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1364\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1364\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> C)ISRM Part II - Domain 3 - Risk Monitoring    <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1364\" class=\"elementor-element elementor-element-ce6c52a e-con-full e-flex e-con e-child\" data-id=\"ce6c52a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1364\" class=\"elementor-element elementor-element-5b748ac e-con-full e-flex e-con e-child\" data-id=\"5b748ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1364\" class=\"elementor-element elementor-element-3ebbd182 e-con-full e-flex e-con e-child\" data-id=\"3ebbd182\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-600ea5cc elementor-widget elementor-widget-text-editor\" data-id=\"600ea5cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Learning Objectives \u00a0\u00a0<\/li><li>Task Statements \u00a0<\/li><li>Knowledge Statements<\/li><li>Essentials \u00a0\u00a0\u00a0\u00a0\u00a0<\/li><li>Risk Indicators \u00a0\u00a0<\/li><li>Risk Indicator Selection Criteria \u00a0<\/li><li>Key Risk Indicators<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1365\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1365\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> C)ISRM Part II - Domain 3 - Risk Monitoring    <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1365\" class=\"elementor-element elementor-element-e157e2a e-flex e-con-boxed e-con e-child\" data-id=\"e157e2a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1365\" class=\"elementor-element elementor-element-f13f779 e-con-full e-flex e-con e-child\" data-id=\"f13f779\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf71097 elementor-widget elementor-widget-text-editor\" data-id=\"cf71097\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Risk Monitoring &nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n<li>Risk Indicator Types and Parameters &nbsp;&nbsp;&nbsp;<\/li>\n<li>Risk Indicator Considerations &nbsp;&nbsp;&nbsp;<\/li>\n<li>Criteria for KRI Selection &nbsp;&nbsp;<\/li>\n<li>Benefits of Selecting Right KRIs &nbsp;&nbsp;<\/li>\n<li>Disadvantages of Wrong KRIs &nbsp;&nbsp;&nbsp;<\/li>\n<li>Changing KRIs &nbsp;&nbsp;<\/li>\n<li>Gathering KRI Data<\/li>\n<li>Steps to Data Gathering &nbsp;<\/li>\n<li>Gathering Requirements &nbsp;&nbsp;<\/li>\n<li>Data Access Data Preparation &nbsp;<\/li>\n<li>Data Validating Considerations &nbsp;<\/li>\n<li>Data Analysis &nbsp;<\/li>\n<li>Reporting and Corrective Actions &nbsp;<\/li>\n<li>Optimizing KRIs &nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n<li>Use of Maturity Level Assessment<\/li>\n<li>Assessing Risk Maturity Levels &nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n<li>Risk Management Capability Maturity Levels &nbsp;&nbsp;<\/li>\n<li>Changing Threat Levels &nbsp;&nbsp;<\/li>\n<li>Monitoring Changes in Threat Levels &nbsp;&nbsp;<\/li>\n<li>Measuring Changes in Threat Levels &nbsp;<\/li>\n<li>Responding to Changes in Threat Levels &nbsp;<\/li>\n<li>Threat Level Review<\/li>\n<li>Changes in Asset Value &nbsp;&nbsp;&nbsp;<\/li>\n<li>Maintain Asset Inventory &nbsp;&nbsp;&nbsp;<\/li>\n<li>Risk Reporting &nbsp;&nbsp;&nbsp;<\/li>\n<li>Reporting Content &nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n<li>Effective Reports<\/li>\n<li>Report Recommendations &nbsp;&nbsp;&nbsp;<\/li>\n<li>Possible Risk Report Recipients&nbsp;<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1366\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1366\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\">  C)ISRM Part II Domain 4 - IS Control Design and Implementation      <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1366\" class=\"elementor-element elementor-element-3cc76f7 e-flex e-con-boxed e-con e-child\" data-id=\"3cc76f7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1366\" class=\"elementor-element elementor-element-cd76f2f e-con-full e-flex e-con e-child\" data-id=\"cd76f2f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1366\" class=\"elementor-element elementor-element-ef32e1d e-con-full e-flex e-con e-child\" data-id=\"ef32e1d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-50c034e elementor-widget elementor-widget-text-editor\" data-id=\"50c034e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Domain 4 Learning Objectives \u00a0\u00a0\u00a0\u00a0<\/li><li>Task Statements \u00a0<\/li><li>Knowledge Statements \u00a0\u00a0<\/li><li>C)ISRM Involvement \u00a0\u00a0\u00a0<\/li><li>Control Definition \u00a0\u00a0<\/li><li>Control Categories \u00a0\u00a0<\/li><li>Control Types and Effects \u00a0\u00a0<\/li><li>Control Methods \u00a0\u00a0<\/li><li>Control Design Considerations \u00a0\u00a0\u00a0<\/li><li>Control Strength \u00a0\u00a0\u00a0<\/li><li>Control Strength \u00a0\u00a0\u00a0\u00a0<\/li><li>Control Costs and Benefits<\/li><li>Potential Loss Measures \u00a0\u00a0<\/li><li>Total Cost of Ownership For Controls \u00a0\u00a0<\/li><li>Role of the C)ISRM in SDLC<\/li><li>The SDLC Process<\/li><li>The Systems Development Life Cycle (SDLC) \u00a0\u00a0\u00a0<\/li><li>Meets and Continues to Meet \u00a0\u00a0<\/li><li>SDLC \u00a0\u00a0<\/li><li>SDLC Phases \u00a0\u00a0\u00a0<\/li><li>Addressing Risk Within the SDLC \u00a0\u00a0\u00a0<\/li><li>Business Risk versus Project Risk \u00a0\u00a0\u00a0<\/li><li>Understanding Project Risk \u00a0\u00a0\u00a0\u00a0<\/li><li>Addressing Business Risk \u00a0\u00a0\u00a0<\/li><li>Understanding Business and Risk Requirements \u00a0\u00a0\u00a0\u00a0<\/li><li>Understand Business Risk \u00a0\u00a0\u00a0\u00a0<\/li><li>High Level SDLC Phases \u00a0\u00a0\u00a0<\/li><li>Project Initiation \u00a0\u00a0<\/li><li>Phase 1 - Project Initiation \u00a0\u00a0\u00a0<\/li><li>Phase 1 Tasks \u00a0\u00a0<\/li><li>Task 1-Feasibility Study \u00a0<\/li><li>Feasibility Study Components \u00a0\u00a0\u00a0<\/li><li>Determining Feasibility \u00a0<\/li><li>Outcomes of the Feasibility Study \u00a0\u00a0<\/li><li>Task 2-Define Requirement \u00a0\u00a0\u00a0<\/li><li>Requirement Progression \u00a0<\/li><li>Business Information Requirements (COBIT) \u00a0<\/li><li>Requirements Success Factors\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1367\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"8\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1367\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> C)ISRM Part II Domain 4 - IS Control Design and Implementation   <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1367\" class=\"elementor-element elementor-element-199fdc6 e-flex e-con-boxed e-con e-child\" data-id=\"199fdc6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1367\" class=\"elementor-element elementor-element-684e334 e-con-full e-flex e-con e-child\" data-id=\"684e334\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1367\" class=\"elementor-element elementor-element-01f0c87 e-con-full e-flex e-con e-child\" data-id=\"01f0c87\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22d968e elementor-widget elementor-widget-text-editor\" data-id=\"22d968e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Task 3-Acquire Software \"Options \u00a0<\/li><li>Software Selection Criteria \u00a0\u00a0\u00a0<\/li><li>Software Acquisition \u00a0\u00a0<\/li><li>Software Acquisition Process \u00a0\u00a0<\/li><li>Leading Principles for Design and Implementation \u00a0\u00a0<\/li><li>C)ISRM Responsibilities \u00a0\u00a0<\/li><li>Key System Design Activities:<\/li><li>Steps to Perform Phase 2<\/li><li>Phase 2 - Project Design and Development<\/li><li>System Testing \u00a0<\/li><li>Test Plans \u00a0<\/li><li>Project Testing \u00a0<\/li><li>Types of Tests \u00a0<\/li><li>UAT Requirements \u00a0<\/li><li>Certification and Accreditation \u00a0\u00a0\u00a0<\/li><li>Project Status Reports \u00a0\u00a0<\/li><li>Phase 3 - Project Testing \u00a0<\/li><li>Testing Techniques \u00a0\u00a0<\/li><li>Verification and Validation \u00a0\u00a0\u00a0\u00a0<\/li><li>Phase 4 - Project Implementation \u00a0\u00a0<\/li><li>Project Implementation \u00a0\u00a0\u00a0<\/li><li>Implementation Phases \u00a0<\/li><li>Phase 4 - Project Implementation<\/li><li>End User Training Plans &amp; Techniques \u00a0<\/li><li>Training Strategy \u00a0\u00a0<\/li><li>Data Migration\/Conversion Considerations \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/li><li>Risks During Data Migration<\/li><li>Data Conversion Steps<\/li><li>Implementation Rollback<\/li><li>Data Conversion Project Key Considerations\u00a0\u00a0<\/li><li>Changeover Techniques\u00a0\u00a0\u00a0<\/li><li>Post-Implementation Review \u00a0<\/li><li>Performing Post-Implementation Review<\/li><li>Measurements of Critical Success Factors<\/li><li>Closing a Project<\/li><li>Project Management and Controlling \u00a0<\/li><li>Project Management Tools and Techniques<\/li><li>Project Management Elements \u00a0\u00a0\u00a0<\/li><li>Project Management Practices \u00a0<\/li><li>PERT chart and critical path\u00a0<\/li><li>PERT Attribute<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3add2827 e-flex e-con-boxed e-con e-child\" data-id=\"3add2827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-796b392b e-flex e-con-boxed e-con e-child\" data-id=\"796b392b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39dfad0 elementor-widget elementor-widget-heading\" data-id=\"39dfad0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Goal<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a33cab7 elementor-widget elementor-widget-text-editor\" data-id=\"2a33cab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Upon completion, Certified Information Systems Risk Manager students will be prepared to pass the C)ISRM exam.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f051be3 e-flex e-con-boxed e-con e-child\" data-id=\"4f051be3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b552e6 elementor-widget elementor-widget-heading\" data-id=\"52b552e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Prerequisites<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cfa19f0 elementor-widget elementor-widget-text-editor\" data-id=\"2cfa19f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><div><div><div><ul><li>Mile2's C)SP<\/li><li>12 months of IT experience<\/li><\/ul><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b52a59 e-flex e-con-boxed e-con e-parent\" data-id=\"5b52a59\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-158a494 elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"158a494\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/CISRM-Web-Outline.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">See the brochure for this course<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\/*! elementor &#8211; v3.22.0 &#8211; 24-06-2024 *\/ .elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\u00a0\u00bb.svg\u00a0\u00bb]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block} \/*! elementor &#8211; v3.22.0 &#8211; 24-06-2024 *\/ .elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]&gt;a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px} Target group IS Security Officers Privacy Officers Health IS Managers Risk Mangers Info Security Managers Government Employees Description Mile2&rsquo;s Certified Information Systems Risk Manager, C)ISRM, course is made for [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":12588,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[87],"duree":[159],"examen":[146],"langue":[164],"niveau":[105],"formateur":[103],"mec_category":[114],"class_list":["post-11263","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-oui","duree-4-jours","examen-oui","langue-anglais","niveau-level-400","formateur-mile2","mec_category-management-roles-information-systems-risk-manager"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>C)ISRM: Certified Information Systems Risk Manager - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Take your risk management skills to the next level with CISRM - learn to assess, control, and monitor information systems across industries.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/cisrm-certified-information-systems-risk-manager\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"C)ISRM: Certified Information Systems Risk Manager - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Take your risk management skills to the next level with CISRM - learn to assess, control, and monitor information systems across industries.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/cisrm-certified-information-systems-risk-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-16T09:55:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/cisrm.png\" \/>\n\t<meta property=\"og:image:width\" content=\"304\" \/>\n\t<meta property=\"og:image:height\" content=\"243\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisrm-certified-information-systems-risk-manager\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisrm-certified-information-systems-risk-manager\\\/\",\"name\":\"C)ISRM: Certified Information Systems Risk Manager - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisrm-certified-information-systems-risk-manager\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisrm-certified-information-systems-risk-manager\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/cisrm.png\",\"datePublished\":\"2024-07-08T12:46:02+00:00\",\"dateModified\":\"2026-01-16T09:55:55+00:00\",\"description\":\"Take your risk management skills to the next level with CISRM - learn to assess, control, and monitor information systems across industries.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisrm-certified-information-systems-risk-manager\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisrm-certified-information-systems-risk-manager\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisrm-certified-information-systems-risk-manager\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/cisrm.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/cisrm.png\",\"width\":304,\"height\":243,\"caption\":\"Take your risk management skills to the next level with CISRM\u2014learn to assess, control, and monitor information systems across industries\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisrm-certified-information-systems-risk-manager\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"C)ISRM: Certified Information Systems Risk Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C)ISRM: Certified Information Systems Risk Manager - ACG CyberAcademy","description":"Take your risk management skills to the next level with CISRM - learn to assess, control, and monitor information systems across industries.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/cisrm-certified-information-systems-risk-manager\/","og_locale":"en_GB","og_type":"article","og_title":"C)ISRM: Certified Information Systems Risk Manager - ACG CyberAcademy","og_description":"Take your risk management skills to the next level with CISRM - learn to assess, control, and monitor information systems across industries.","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/cisrm-certified-information-systems-risk-manager\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2026-01-16T09:55:55+00:00","og_image":[{"width":304,"height":243,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/cisrm.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/cisrm-certified-information-systems-risk-manager\/","url":"https:\/\/acgcyberacademy.fr\/events\/cisrm-certified-information-systems-risk-manager\/","name":"C)ISRM: Certified Information Systems Risk Manager - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/cisrm-certified-information-systems-risk-manager\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/cisrm-certified-information-systems-risk-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/cisrm.png","datePublished":"2024-07-08T12:46:02+00:00","dateModified":"2026-01-16T09:55:55+00:00","description":"Take your risk management skills to the next level with CISRM - learn to assess, control, and monitor information systems across industries.","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/cisrm-certified-information-systems-risk-manager\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/cisrm-certified-information-systems-risk-manager\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/cisrm-certified-information-systems-risk-manager\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/cisrm.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/cisrm.png","width":304,"height":243,"caption":"Take your risk management skills to the next level with CISRM\u2014learn to assess, control, and monitor information systems across industries"},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/cisrm-certified-information-systems-risk-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"C)ISRM: Certified Information Systems Risk Manager"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/11263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=11263"}],"version-history":[{"count":1,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/11263\/revisions"}],"predecessor-version":[{"id":16876,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/11263\/revisions\/16876"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/12588"}],"wp:attachment":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=11263"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=11263"},{"taxonomy":"accesibilite","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=11263"},{"taxonomy":"certification","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=11263"},{"taxonomy":"duree","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=11263"},{"taxonomy":"examen","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=11263"},{"taxonomy":"langue","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=11263"},{"taxonomy":"niveau","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=11263"},{"taxonomy":"formateur","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=11263"},{"taxonomy":"mec_category","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=11263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}