• Home

Certified in Risk and Information System Control® (CRISC®) Examination Preparation

Certified in Risk and Information System Control® (CRISC®) Examination Preparation

General Information:

Globally accepted management-focused certification for professionals with three or more years of experience. This credential demonstrates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. There are 150 Questions on the exam, which must be completed in 4 hours. It is available online via remote proctoring and at in-person testing centers where available.

The CRISC Certification is intended for:

IT risk management professionals with at least 3 years of relevant professional work experience in IT risk and information systems control, including:

  • Security Directors/Managers/Consultants
  • Compliance/Risk/Privacy Directors and Managers
  • IT Audit Directors/Managers/Consultants
  • Compliance/Risk/Control Staff

CPE Overview:

To maintain your CRISC, you must earn and report a minimum of 120 CPE hours every 3-year reporting cycle and at least 20 hours annually. CRISC awards up to 1 hour of CPE for every 1 hour of instructor-led training. The online review course earns 15 CPEs, and the Virtual Instructor-Led Course (VILT) earns 14 CPEs.

Course Duration:

  • Online Course: Approximately 12 hours
  • In-person Training or VILT: 2-4 days

Course Topics Include:

Domain 1: IT Risk Identification

Identify the universe of IT risk to contribute to the execution of the IT risk management strategy in support of business objectives and in alignment with the enterprise risk management (ERM) strategy.

  • Collect and review information, including existing documentation, regarding the organization’s internal and external business and IT environments to identify potential or realized impacts of IT risk on the organization’s business objectives and operations.
  • Identify potential threats and vulnerabilities to the organization’s people, processes, and technology to enable IT risk analysis.
  • Develop a comprehensive set of IT risk scenarios based on available information to determine the potential impact to business objectives and operations.
  • Identify key stakeholders for IT risk scenarios to help establish accountability.
  • Establish an IT risk register to help ensure that identified IT risk scenarios are accounted for and incorporated into the enterprise-wide risk profile.
  • Identify risk appetite and tolerance defined by senior leadership and key stakeholders to ensure alignment with business objectives.
  • Collaborate in the development of a risk awareness program, and conduct training to ensure that stakeholders understand risk and to promote a risk-aware culture.

Domain 2: IT Risk Assessment

Analyze and evaluate IT risk to determine the likelihood and impact on business objectives to enable risk-based decision-making.

  • Analyze risk scenarios based on organizational criteria (e.g., organizational structure, policies, standards, technology, architecture, controls) to determine the likelihood and impact of an identified risk.
  • Identify the current state of existing controls and evaluate their effectiveness for IT risk mitigation.
  • Review the results of risk and control analysis to assess any gaps between current and desired states of the IT risk environment.
  • Ensure that risk ownership is assigned at the appropriate level to establish clear lines of accountability.
  • Communicate the results of risk assessments to senior management and appropriate stakeholders to enable risk-based decision-making.
  • Update the risk register with the results of the risk assessment.

Domain 3: Risk Response Mitigation

Determine risk response options and evaluate their efficiency and effectiveness to manage risk in alignment with business objectives.

  • Consult with risk owners to select and align recommended risk responses with business objectives and enable informed risk decisions.
  • Consult with, or assist risk owners in developing risk action plans to ensure that plans include key elements (e.g., response, cost, target date).
  • Consult on the design and implementation or adjustment of mitigating controls to ensure that the risk is managed to an acceptable level.
  • Ensure that control ownership is assigned to establish clear lines of accountability.
  • Assist control owners in developing control procedures and documentation for efficient and effective control execution.
  • Update the risk register to reflect changes in risk and management’s risk response.
  • Validate that risk responses have been executed according to the risk action plans.

Domain 4: Risk and Control Monitoring and Reporting

Continuously monitor and report on IT risk and controls to relevant stakeholders to ensure the efficiency and effectiveness of the IT risk management strategy and its alignment with business objectives.

  • Define and establish key risk indicators (KRIs) and thresholds based on available data, to enable monitoring of changes in risk.
  • Monitor and analyze key risk indicators (KRIs) to identify changes or trends in the IT risk profile.
  • Report on changes or trends related to the IT risk profile to assist management and relevant stakeholders in decision-making.
  • Facilitate the identification of metrics and key performance indicators (KPIs) to measure control performance.
  • Monitor and analyze key performance indicators (KPIs) to identify changes or trends related to the control environment and determine the efficiency and effectiveness of controls.
  • Review the results of control assessments to determine the effectiveness of the control environment.
  • Report on the performance of, changes to, or trends in the overall risk profile and control environment to relevant stakeholders to enable decision making


Event Information

Event Date To Be Confirmed
Event End Date 12-31-2099
Capacity Unlimited
Registered 0
Individual Price $1,495.00
Location Virtual