Practical, achievable and sustainable information security risk assessment methodology Based on authors’ experiences of real-world assessments, reports, and presentations
Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment
Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment
In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.
Unless otherwise noted above, most orders ship within 1 to 2 days. We will promptly notify you if there is a stock problem with any items on your order and provide you with an estimated delivery date. If you have a firm need by date, please provide such information in the comment section at checkout.
Page Count (est.): 258
Pub Date: 10/27/2012