Cyber Risk Assessment – Recover from Incidents

Field: Auditing | Delivery Method: Self Study | CPE Hours: 1.5

  Enroll in Course

Recovery from a cybersecurity incident is a critical aspect of today’s business plan. Due to the number and level of cyber threats, organizations are best to assume some type of incident “will” occur rather than assuming it “will not occur”.


The recover function is the final step in the NIST Cybersecurity framework. NIST defines an event as any observable occurrence in a system or network. An incident is defined as a violation of acceptable policies, or security policies and best practices. A cyber event is a specific cybersecurity incident or set of related cybersecurity incidents that result in the successful compromise of one or more information systems.

Capabilities in the Recover function have a significant effect by providing realistic data for improving other capabilities. The Cybersecurity Strategy and Implementation Plan (CSIP) defines recover as:
The development/ implementation of plan/ processes/procedures for recovery and full restoration, in a timely manner, of capabilities or services that are impaired due to a cyber event.

Recovery according to NIST involves adequate recovery planning, improvement implementation and communication. This session will explore each of these components along with various elements which will assist the organization in planning for an effective recovery.

Lesson Objectives:
  • Explore the Recovery purpose and objective.
  • Identify elements required for recovery planning.
  • Explore Recovery planning development of procedures.
  • Identify processes to initiate Recovery planning procedures.
  • Explore the strategic component of the Recovery process.
  • Identify the root cause of incidents.
  • Explore improvement methods for the Recovery phase.
  • Explore communication methods for the Recovery phase.

Field: Auditing
CPE: 1.5
Delivery Method: Self-Study
Format: Video



Your Instructor


Lynn Fountain
Lynn Fountain

Consultant, CPA, CGMA, CRMA, MBA, Past Chief Audit Executive

Business Consultant, Trainer, Author


Ms. Fountain has over 40 years of experience spanning public accounting, industry accounting and consulting. Sixteen years of that experience has been in the field of internal audit, risk managment and process improvement. She is well adept to assist your organization evaluate business strategy, perform risk assessments, establish a Sarbanes-Oxley process, synergizing internal audit processes or perform process improvement projects.


As a past corporate executive Lynn has a passion for working with professionals to enhance their processes and provide leading edge education. She has authored and delivered hundreds of training courses for accounting, finance and audit professionals. Her training is filled with not just theory but real world application.


Ms. Fountain has authored three technical publications:

-Leading the Internal Audit Function 

-Raise the Red Flag

-Ethics and the Internal Auditor's political dilemma


Lynn is a recognized leader in the internal audit profession as well as a recognized business professional.  


Ms. Fountain obtained her BSBA from Pittsburg State University and her MBA from Washburn University in Kansas. She has active, current CPA, CGMA, and CRMA credentials.


https://www.lynnfountain.net/


Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 7 days and we will give you a full refund.

Get started now!