Workable risk management

Share this article:

When considering developing a risk management plan, every chief information security officer (CISO) should take the following points into consideration. First, you really need to define your current level of risk exposure. This fluctuates with each internal change to networks, new external threats and ongoing regulatory requirements.

Then, it's worthwhile to consider what your top security risks are and question which assets are exposed to the most significant threats with the highest damage potential.

You will want to define how susceptible you are to the next cyberthreat. Knowing which threats will affect you prepares you to take necessary emergency actions.

Determine whether you are in compliance with your documented security policies. Changes in one segment of the environment can have unintended consequences on other areas.

Measuring the value of security investments is important. When making an investment to improve security, risks should be reduced and focused on remediation programs and technology that have the greatest impact.

Effective risk management requires an up-to-date understanding of risk levels based on an ongoing monitoring program that decision-makers can trust. By taking a holistic view of threats, vulnerabilities, network access policies and potential business impacts, businesses are better able to identify, visualize and quantify information security risks.

Share this article:
close

Next Article in News

Sign up to our newsletters

More in News

Brazilian president signs internet 'Bill of Rights' into law

Brazilian president signs internet 'Bill of Rights' into ...

President Dilma Rousseff signed the legislation on Wednesday at the NetMundial conference in Sao Paulo.

Android trojan sends premium SMS messages, targets U.S. users for first time

Android trojan sends premium SMS messages, targets U.S. ...

An SMS trojan for Android, known as FakeInst, has been observed sending premium SMS messages to users all over the world, including, for the first time, the United States.

Report: DDoS up in Q4 2013, vulnerability scanners leveraged to exploit sites

Report: DDoS up in Q4 2013, vulnerability scanners ...

Researchers observed 346 DDoS attacks in the final quarter of 2013 and attackers used Vega and Skipfish vulnerability scanners to exploit web flaws at financial companies.