mitigate risk

What steps are necessary to mitigate risk to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls?

Cyber Security Report Research some of the access control methods that are utilized within your organization. For example, does your organization leverage public key infrastructure, key card authentication, or login hours? If you are not currently working, what access control methods have you seen, and how effective were the control methods? Explore the pros and […]

Prepare students for the fast-paced environment of investment banking and fund management firms which rely on modern portfolio analysis and risk management for their business activities.

1. Prepare students for the fast-paced environment of investment banking and fund management firms which rely on modern portfolio analysis and risk management for their business activities. 2. Examine the issues involved in constructing an investment portfolio, evaluating the performance of that portfolio, and adjusting its composition through time to ensure that its performance remains […]

Scroll to top