- Information Security Handbook
- Darren Death
- 479字
- 2021-07-02 21:55:48
Risk management
After having conducted a security assessment of the organization it will then become necessary to take your security assessment data and conduct a risk assessment. In conducting a risk assessment you can begin to prioritize the activities that you want to implement first, second, and so on, as you build your security program. During the risk assessment, you will want to take what you learned from the organization's leaders and ensure your prioritization serves the organization's goals so that you effectively describe your assessment and plan in business terms. Ultimately, the introduction of an information security program is one of organizational change. You want to ensure that you are presenting the changes you wish to make in organizational terms versus IT terms. This will help you to win the approval of leadership, which will provide you with the needed authority and funding to make changes to the organization.
Managing an information security program is really about risk management. Ultimately, how an organization deals with specific vulnerabilities in its IT systems, business processes, and staff has to do with its ability to manage risk. Organizational leaders are going to want to understand how vulnerabilities found in the assessment are going to impact the organization's ability to conduct business or serve their customers. Leadership will also want to understand the likelihood of a risk occurring and what the potential impact could be if this occurred.
It is important to identify the possible business impact of the risk. Each business owner will have its own risk concerns, and each business risk will be tied to a business function/dollar amount. Recommendations for fixes, mitigations, and so on, should tie into the return on investment (ROI). For example:
- A HIPPA violation could cost an organization millions, however, a solution to the risk might only cost $38,000 annually, which will mitigate the risk and lower the overall risk posture.
- If you break that $38,000 down by the number of users who have access to the data, say 11,000, you come down to $3.45 per user for minimizing the risk posture. Your return on investment is easy to argue, and gain leadership support for.
Armed with this information, you can build out a plan that describes the specific IT implementations that need to be carried out in an organization based on the assessments that were previously conducted and the risk assessment that followed. The plan contains the priorities identified in the risk assessment process.
Based on the risk assessment, you will know the following:
- What the top risks are in the organization
- What the most valuable assets are for your organization
- What risks are most likely to occur
- What the impacts will be when a risk occurs
With this information, you have everything necessary to build a well-supported evidence-based plan to move your organization forward as it changes to implement modern information security practices.
- Mastering Spark for Data Science
- Mastercam 2017數控加工自動編程經典實例(第4版)
- 3D Printing with RepRap Cookbook
- Java開發技術全程指南
- Maya極速引擎:材質篇
- 完全掌握AutoCAD 2008中文版:機械篇
- 中國戰略性新興產業研究與發展·工業機器人
- Dreamweaver CS6精彩網頁制作與網站建設
- 從零開始學PHP
- Working with Linux:Quick Hacks for the Command Line
- C++程序設計基礎(上)
- Spark大數據商業實戰三部曲:內核解密|商業案例|性能調優
- 手把手教你學Flash CS3
- Eclipse RCP應用系統開發方法與實戰
- 基于Quartus Ⅱ的數字系統Verilog HDL設計實例詳解