SUMMARY

Information security risk management and, in particular, cyber risk ­management is almost overwhelmed with information on what to do. However, the 80:20 rule still applies. In addition, good information security risk management and good cyber risk management use exactly the same tools of risk and control self-assessment, key risk indicators and event causal analysis as any other type of risk management. Get the basics right (and this can be done quite quickly as noted above) and you will have achieved a significant amount in terms of securing the cerebral, material and digital information in your firm.

Get Mastering Risk Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.