O'Reilly logo

Managing Information Security: Studies from real life by Michael Krausz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 2: GETTING YOUR RISK PROFILE RIGHT

The best breach is, of course, the one that never happens. In order to achieve that, it is of paramount importance to get one’s risk profile right and to fully and thoroughly understand the risk situation of the company. The word ‘situation’ includes knowledge about threats, vulnerabilities, potential damage, likelihoods, business options for treatment and acceptable losses, all under the circumstances and business environment the company operates in for all its branches, subsidiaries and locations.

We will describe two ways of understanding one’s risk profile: a rather intuitive one, to serve as a starting point yielding reasonable results, and a more extensive one, including all necessary parameters ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required