Chapter 8
Information Security Risk Assessment: Maintenance and Wrap Up
Information in this chapter:
• Process Summary
• Key Deliverables
• Post Mortem
Introduction
Information security is one of the most dynamic and fast changing fields. Security threats are constantly evolving, new vulnerabilities are being discovered, and new exploits are being created to target those vulnerabilities. This ever changing threat landscape requires that your organization and the assessment of your organization’s risk to these threats evolve as well. Other than just the rapid pace of external factors it is important not to forget that business changes that aren’t directly security related, can often affect the security posture of the organization in some way. ...
Get Information Security Risk Assessment Toolkit now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.