CHAPTER SUMMARY
Given the complexity of both networks and organizations, the ongoing (and increasing) number and veracity of external threats, and the high cost of a breach, performing comprehensive risk assessments is a must for all organizations.
Regardless of the organization’s size, it’s imperative to act as one’s own worst enemy by diligently and honestly looking at vulnerabilities and potential threats. It’s not always a pleasant task to point out areas where your own team may have left a vulnerability open, but it’s much better than having an attacker find it for you.
Once completed, you should follow up the risk assessment with security audits that occur on a regular basis to ensure that mitigating actions and controls have been implemented ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access