{"id":11,"date":"2026-04-02T10:46:42","date_gmt":"2026-04-02T14:46:42","guid":{"rendered":"https:\/\/community.mis.temple.edu\/jhenderson\/blog\/points\/enterprise-security-risk-management-for-cybersecurity-managers\/"},"modified":"2026-04-02T10:46:42","modified_gmt":"2026-04-02T14:46:42","slug":"enterprise-security-risk-management-for-cybersecurity-managers","status":"publish","type":"points","link":"https:\/\/community.mis.temple.edu\/jhenderson\/points\/enterprise-security-risk-management-for-cybersecurity-managers\/","title":{"rendered":"Enterprise Security Risk Management for Cybersecurity Managers"},"content":{"rendered":"<div class=\"flex flex-col text-sm pt-4 pb-12\">\n<div>\n<div id=\"mini-chat-content\" class=\"block\">\n<section class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" data-turn-id=\"request-WEB:672b46bf-545c-4bc4-9dad-b107f2155f96-0\" data-testid=\"conversation-turn-2\" data-scroll-anchor=\"true\" data-turn=\"assistant\">\n<div class=\"text-base my-auto mx-auto pb-8 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm\/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg\/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)\">\n<div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex max-w-full flex-col gap-4 grow\">\n<div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1\" dir=\"auto\" tabindex=\"0\" data-message-author-role=\"assistant\" data-message-id=\"960cf9f2-3245-4948-9f71-aa6b0413b209\" data-message-model-slug=\"gpt-5-3\" data-turn-start-message=\"true\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden\">\n<div class=\"markdown prose dark:prose-invert w-full wrap-break-word dark markdown-new-styling\">\n<p data-start=\"0\" data-end=\"1074\" data-is-last-node=\"\" data-is-only-node=\"\">I developed a structured understanding of how organizations identify, assess, and manage cybersecurity risks using internationally recognized frameworks. I learned how to apply risk assessment methodologies, including evaluating threats, vulnerabilities, likelihood, and impact, and how to prioritize risks using tools such as risk matrices. The course also emphasized the importance of risk treatment strategies\u2014such as mitigation, transfer, acceptance, and avoidance\u2014and how these decisions align with broader governance and compliance requirements. This activity directly relates to my coursework in Management Information Systems by reinforcing concepts in cybersecurity, risk management, and enterprise IT governance, while also supporting my career goal of working in a technical or security-focused role where I can contribute to protecting organizational assets and improving decision-making through structured risk analysis.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"z-0 flex min-h-[46px] justify-start\"><\/div>\n<div class=\"mt-3 w-full empty:hidden\">\n<div class=\"text-center\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1\"><\/div>\n<\/div>\n<\/div>\n","protected":false},"author":30630,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-11","points","type-points","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/jhenderson\/wp-json\/wp\/v2\/points\/11","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/jhenderson\/wp-json\/wp\/v2\/points"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/jhenderson\/wp-json\/wp\/v2\/types\/points"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/jhenderson\/wp-json\/wp\/v2\/users\/30630"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/jhenderson\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":0,"href":"https:\/\/community.mis.temple.edu\/jhenderson\/wp-json\/wp\/v2\/points\/11\/revisions"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/jhenderson\/wp-json\/wp\/v2\/media?parent=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}