Due before class:
Watch this video:
Read the following:
- The Risk IT Framework, https://drive.google.com/a/temple.edu/file/d/0B8S2SZTC04VidHNpR3NybkM5XzA/view?usp=sharing
- “What’s Your Risk Appetite?”, https://drive.google.com/file/d/0B8S2SZTC04ViM0dxSTQ3d25ELWM/view
- “Insurance Grows for Cyberattacks”
- “Counting the Cost: Cyber Exposure Report” https://www.lloyds.com/~/media/files/news-and-insight/risk-insight/2017/cyence/emerging-risk-report-2017—counting-the-cost.pdf
- COBIT 5: Enabling Processes – APO12 https://drive.google.com/open?id=0B8S2SZTC04ViYVRpUWxTczU4RXM
- All-in-One CISSP Exam Guide 7th Edition: pp 102-126
Consider the following case:
- “All World Airlines”, https://drive.google.com/a/temple.edu/file/d/0B8S2SZTC04VidEJnMlVLRDlxeTg/view?usp=sharing
Resources:
- Just what is risk appetite and how does it differ from risk tolerance? https://normanmarks.wordpress.com/2011/04/14/just-what-is-risk-appetite-and-how-does-it-differ-from-risk-tolerance/
- Formailzing IT Risk Governance Presentation: http://community.mis.temple.edu/mis5202online2017/files/2017/08/Formalizing-IT-Risks-Management-Governance.pdf
- Business Consequences: http://www.orlandosentinel.com/business/brinkmann-on-business/os-rosen-hotels-data-breach-20170329-story.html
- Insurers counter sue: https://www.theregister.co.uk/2015/05/28/cottage_healthcare_system_sued/