Cybersecurity Risk

Risk Assessment - What to Assess


Listen Later

Send us a text

These 3 steps you can take to perform a risk assessment:

  1. Identify and document the scope and assets to be assessed. I suggest starting with your critical assets.
  2. Identify and collect your assessment data.
    1. Vulnerability scan (including applications)
    2. Minimum security baseline scan
    3. Access management at the OS and application levels
    4. Standard exceptions against your scoped systems
    5. Security information and event management (SIEM) logging and alerting
  3. Analyze and report
    The most important part is the analysis, since quantitative data alone may not provide the correct information.

========

Training: https://www.execcybered.com/iso27001foundationcourse

Linkedin: https://www.linkedin.com/company/exceccybered/

Twitter: https://twitter.com/DrBillSouza

Instagram: https://www.instagram.com/drbillsouza/

Author: Dr. Bill Souza | Jun 28, 2022 

...more
View all episodesView all episodes
Download on the App Store

Cybersecurity RiskBy Dr. Bill Souza

  • 5
  • 5
  • 5
  • 5
  • 5

5

1 ratings