Assess and Manage Security Risks – Phases 1-4

Author(s): Michel Hebert

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Use this blueprint to lay down the foundations for security risk management, including:

  • Establishing governance.
  • Defining the security risk management process.
  • Documenting roles and responsibilities.
  • Threat modeling and assessment.
  • Recommending risk treatments.
  • Integrating security risk into IT and enterprise risk management activities.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019