List and understand security requirements of business resources as exposure to threat increases.
Shift the above criteria to the area of IT controls required in an increasingly technological organisation.
Define and limit continuity and contingency plans according to process criticality in each type of company.
Identify and rate the most common tools for corporate risks in the present market, including new arising trends.
Identify other types of risks in different situations where technology is involved.
The Connected Economy
Loss of information costs
Information Security Criteria
Elements of Computer Risk
IT Risk Management Life Cycle
Information Security Management System
Different types of Information Security Controls
Threats to Confidentiality
Threats to Integrity
Threats to Availability
The 4 Points of View on Threats
The Consideration of Information
Outsourcing and Employees as Threats
Protection as a Weighted Sum
Contingency and Update Plan
Critical Asset Discrimination and Collaboration
Risks associated with domestic, industrial or professional activities
Risks associated with sporting activities
Risks associated with everyday places or travel
Risks related to industrial production
Risks related to hazardous materials storage
Risks involved in the breakdown of civil engineering works and accidents of vehicles transporting dangerous goods
Risks associated with the exploitation of mining resources, Collapses, Instability of slopes near the entrances, Instability of wells (access or ventilation wells), Water pollution. Fracking
Risks associated with past human activity: Old factories, Landfill (pollution, fire)
Epidemic and pandemic risks
Risks from transgenic or genetically modified species
Risk of multi-resistance of pathogens
Risk of nosocomial diseases.
Risks of development in defective products.