Combine Security Risk Management Components Into One Program – Phase 1: Establish the Risk Environment

Author(s): Filipe De Souza, Sean Thurston, Cameron Smith, Ian Mulholland

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Without clear responsibilities set out in a risk management plan, the right decision makers can be left out of the conversations that they are needed for. This phase will take you through the following activities:

  • Determine the function of the risk executive.
  • Determine the function of the board of directors and IT security group.
  • Build a security risk responsibilities document.
  • Define the organizational risk tolerance level.

Use this phase as part of the full blueprint, Combine Information Security Risk Management Components Into One Program.

View the Complete Blueprint:

Combine Security Risk Management Components Into One Program

With great risk management comes a great security program.

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019