- CISO Series Newsletter
- Posts
- 11-18-20 - 22 Effective Information Security Risk Management Techniques
11-18-20 - 22 Effective Information Security Risk Management Techniques
22 Effective InfoSec Risk Management Techniques
22 Effective Information Security Risk Management Techniques
It is often said that security professionals aren’t in the job of security. Their job is managing risk.
But understanding what your risk is and managing it seems so amorphous. How are business activities introducing risk? What is your risk tolerance? What security controls should you apply to lower the risk? How do you even know if any of your actions are doing their job of lowering and maintaining risk levels?
That very last question could be the barometer of how well security is doing its job providing value to the business.
Read on for the advice from 23 extremely savvy security and risk management professionals and
. I want your criticisms, your raves, and all the aspects of risk management you think I missed. In just a couple of weeks I'll release a video of my favorite responses.
Special thanks to the article sponsor, Reciprocity
ZenGRC by Reciprocity is an award-winning, cloud-based GRC software that automates and simplifies compliance and risk management, solving critical problems at scale while customizing to your business needs. Adhering to the majority of regulations is a snap with pre-built templates and a unified system of
record. Learn more about information security risk management at reciprocitylabs.com.
Subscribe to all our podcasts
Click any of the podcasts below to get access to the subscription feeds. If you're already a subscriber, thank you!