11-18-20 - 22 Effective Information Security Risk Management Techniques

22 Effective InfoSec Risk Management Techniques

CISO Series

22 Effective Information Security Risk Management Techniques

22 Effective Information Security Risk Management Techniques

It is often said that security professionals aren’t in the job of security. Their job is managing risk.

But understanding what your risk is and managing it seems so amorphous. How are business activities introducing risk? What is your risk tolerance? What security controls should you apply to lower the risk? How do you even know if any of your actions are doing their job of lowering and maintaining risk levels?

That very last question could be the barometer of how well security is doing its job providing value to the business. 

Read on for the advice from 23 extremely savvy security and risk management professionals and

. I want your criticisms, your raves, and all the aspects of risk management you think I missed. In just a couple of weeks I'll release a video of my favorite responses.

Special thanks to the article sponsor, Reciprocity

Reciprocity

ZenGRC by Reciprocity is an award-winning, cloud-based GRC software that automates and simplifies compliance and risk management, solving critical problems at scale while customizing to your business needs. Adhering to the majority of regulations is a snap with pre-built templates and a unified system of

Subscribe to all our podcasts

Click any of the podcasts below to get access to the subscription feeds. If you're already a subscriber, thank you!