<aside> 📌 Summary

</aside>

Introduction

Objectives of the module :

Base information on tech needed for GRC analyst

Understand the GRC analyst work context

A basic primer on networking and a little bit about systems

Cybersecurity

Cybersecurity is about people, processes and technology.

CIA ⇒ Confidentiality Integrity Availability

Cyber security framework

Think left and right of the boom (identify & protect are on the left side of a boom)

Untitled

GRC look around Identify & Protect

<aside> 📌 Terminology

Vulnerability: A weakness in a person, process or technology

Exploit: An attack on a vulnerability

Risk: How likely and how bad an exploited vulnerability is

Incident: An actively exploited vulnerability

Malware: Malicious software

</aside>

The GRC Analyst job

Works on the Identify and Protect section of the NIST framework

Limit the negative consequences and the bad stuff happening

Get the company in the best position possible

<aside> 📌 Completing the GCR, Security operation focus on during and after the boom.

</aside>

Key activities

Compliance and audit: Are we compliant? Can we demonstrate?

Security awareness: Mitigating risk from people

Assess risk: Are we at risk? Should we invest in security? How much should we invest?