Combine Security Risk Management Components Into One Program – Phase 1: Establish the Risk Environment

Author(s): Filipe De Souza, Sean Thurston, Cameron Smith, Ian Mulholland

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Without clear responsibilities set out in a risk management plan, the right decision makers can be left out of the conversations that they are needed for. This phase will take you through the following activities:

  • Determine the function of the risk executive.
  • Determine the function of the board of directors and IT security group.
  • Build a security risk responsibilities document.
  • Define the organizational risk tolerance level.

Use this phase as part of the full blueprint, Combine Information Security Risk Management Components Into One Program.

Related Content

Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019