CRISC—Certified in Risk and Information Systems Control

What is the CRISC difference?

A Certified in Risk and Information Systems Control® (CRISC®) certification will make you a Risk Management expert. Studying a proactive approach based on Agile methodology, you’ll learn how to enhance your company’s business resilience, deliver stakeholder value and optimize Risk Management across the enterprise.

What you will learn with the CRISC certification?

domain_percent_26

Domain 1

Corporate IT Governance

domain_percent_20

Domain 2

IT Risk Assessment

domain_percent_32

Domain 3

Risk Response & Reporting

domain_percent_22

Domain 4

Information Technology & Security

26% DOMAIN 1 – GOVERNANCE

The governance domain interrogates your knowledge of information about an organization’s business and IT environments, organizational strategy, goals and objectives, and examines potential or realized impacts of IT risk to the organization’s business objectives and operations, including Enterprise Risk Management and Risk Management Framework.

A—ORGANIZATIONAL GOVERNANCE

  1. Organizational Strategy, Goals, and Objectives
  2. Organizational Structure, Roles and Responsibilities
  3. Organizational Culture
  4. Policies and Standards
  5. Business Processes
  6. Organizational Assets

B—RISK GOVERNANCE

  1. Enterprise Risk Management and Risk Management Framework
  2. Three Lines of Defense
  3. Risk Profile
  4. Risk Appetite and Risk Tolerance
  5. Legal, Regulatory and Contractual Requirements
  6. Professional Ethics of Risk Management

20% DOMAIN 2 – IT RISK ASSESSMENT

This domain will certify your knowledge of threats and vulnerabilities to the organization’s people, processes and technology as well as the likelihood and impact of threats, vulnerabilities and risk scenarios.
A—IT RISK IDENTIFICATION
  1. Risk Events (e.g., contributing conditions, loss result)
  2. Threat Modelling and Threat Landscape
  3. Vulnerability and Control Deficiency Analysis (e.g., root cause analysis)
  4. Risk Scenario Development
B—IT RISK ANALYSIS AND EVALUATION
  1. Risk Assessment Concepts, Standards and Frameworks
  2. Risk Register
  3. Risk Analysis Methodologies
  4. Business Impact Analysis
  5. Inherent and Residual Risk

32% DOMAIN 3 – RISK RESPONSE AND REPORTING

This domain deals with the development and management of risk treatment plans among key stakeholders, the evaluation of existing controls and improving effectiveness for IT risk mitigation, and the assessment of relevant risk and control information to applicable stakeholders.
A—RISK RESPONSE
  1. Risk Treatment / Risk Response Options
  2. Risk and Control Ownership
  3. Third-Party Risk Management
  4. Issue, Finding and Exception Management
  5. Management of Emerging Risk
B—CONTROL DESIGN AND IMPLEMENTATION
  1. Control Types, Standards and Frameworks
  2. Control Design, Selection and Analysis
  3. Control Implementation
  4. Control Testing and Effectiveness Evaluation
C—RISK MONITORING AND REPORTING
  1. Risk Treatment Plans
  2. Data Collection, Aggregation, Analysis and Validation
  3. Risk and Control Monitoring Techniques
  4. Risk and Control Reporting Techniques (heatmap, scorecards, dashboards)
  5. Key Performance Indicators
  6. Key Risk Indicators (KRIs)
  7. Key Control Indicators (KCIs)

22% DOMAIN 4 – INFORMATION TECHNOLOGY AND SECURITY

In this domain we interrogate the alignment of business practices with Risk Management and Information Security frameworks and standards, as well as the development of a risk-aware culture and implementation of security awareness training.
A—INFORMATION TECHNOLOGY PRINCIPLES
  1. Enterprise Architecture
  2. IT Operations Management (e.g., change management, IT assets, problems, incidents)
  3. Project Management
  4. Disaster Recovery Management (DRM)
  5. Data Lifecycle Management
  6. System Development Life Cycle (SDLC)
  7. Emerging Technologies
B—INFORMATION SECURITY PRINCIPLES
  1. Information Security Concepts, Frameworks and Standards
  2. Information Security Awareness Training
  3. Business Continuity Management
  4. Data Privacy and Data Protection Principles
Scroll to Top