Conducting a cybersecurity risk assessment
ISO 27001 is the international standard that sets out the specification of an information security management system (ISMS), a best-practice approach to addressing information security that encompasses people, processes, and technology.
The assessment and management of information security risks is at the core of ISO 27001, which ensures that the ISMS continually adapts to changes in the organization and the risk environment.
Alan Calder will cover the following topics:
• The five-step approach to conducting a risk assessment
• Information security versus cybersecurity
• Choosing appropriate risk treatment options
• Unpacking the key controls necessary for effective cybersecurity
• Reviewing and monitoring and reporting on the risk assessment
• ISO 27001 and effective information security risk management
Download presentation slides: http://bit.ly/2FZ5Hbk
Видео Conducting a cybersecurity risk assessment канала IT Governance USA Inc.
The assessment and management of information security risks is at the core of ISO 27001, which ensures that the ISMS continually adapts to changes in the organization and the risk environment.
Alan Calder will cover the following topics:
• The five-step approach to conducting a risk assessment
• Information security versus cybersecurity
• Choosing appropriate risk treatment options
• Unpacking the key controls necessary for effective cybersecurity
• Reviewing and monitoring and reporting on the risk assessment
• ISO 27001 and effective information security risk management
Download presentation slides: http://bit.ly/2FZ5Hbk
Видео Conducting a cybersecurity risk assessment канала IT Governance USA Inc.
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Cybersecurity Risk Assessment (A Step by Step Tutorial and WHY!)Risk Assessment as per NIST SP 800-30Performing a Security Assessment of the Cloud using the Risk Management Framework: A Case StudyAssessing compliance: the ISO 27001 ISMS internal auditPractical Risk Assessment and MitigationRisk Assessment - CompTIA Security+ SY0-501 - 5.3Security Risk Assessments Made EasyISO 27001 Introduction | ISO 27001 - Mastering Audit Techniques | ISO 27001 for Beginners?An Overview of Risk Assessment According to ISO 27001 and ISO 27005Everything you need to know about SOC 2 Compliance | SecureframeThe 20 Critical Security Controls: From Framework to Operational to ImplementationImplementing a Quantitative Cyber-Risk Framework: A FinSrv Case StudyISO 27001 vs SOC 2: What’s the difference?Webinar: Simplify GRC with ServiceNow Integrated Risk ManagementVirtual Session: NIST Cybersecurity Framework ExplainedISO 27001 Risk Assessment: The Ultimate Guide24 Understand risk vs uncertaintyHow to Present Cyber Security Risk to Senior Leadership | SANS WebcastIT / Information Security Risk Management With ExamplesPASTA Threat Modeling for Cybersecurity | OWASP All Chapters 2020 Presentation