If you can’t describe what you are doing as a process, you don’t know what you’re doing.
—W. Edwards Deming1
In Chapter 10, I introduced the ECRM Process based on “Managing Information Security Risk” (NIST Special Publication 800-39)2 and the four basic steps, each informing the other steps. To summarize, they are frame risk, assess risk, respond to risk, and monitor risk.
The NIST approach to ECRM focuses heavily on “managing the downside” with a focus on risk. ...