In order to protect company s information assets such as
sensitive customer records, health care records, etc., the security
practitioner first needs to find out: what needs protected, what
risks those assets are exposed to, what controls are in place to
offset those risks, and where to focus attention for risk
treatment. This is the true value and purpose of information
security risk assessments. Effective risk assessments are meant to
provide a defendable analysis of residual risk associated with your
key assets so that risk treatment options can be
explored."Information Security Risk Assessments" gives you the
tools and skills to get a quick, reliable, and thorough risk
assessment for key stakeholders.
Based on authors experiences of real-world assessments, reports,
and presentations
Focuses on implementing a process, rather than theory, that allows
you to derive a quick and valuable assessment
Includes a companion web site with spreadsheets you can utilize to
create and maintain the risk assessment"
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!