Workable risk management

By on
Workable risk management

Information security has evolved from safeguarding systems to protecting business services and brands against risk. Senior security executives must closely understand and monitor the level of risk exposure a company has, how the latest threats impact their risk exposure, which system vulnerabilities and access violations represent an actual exploit risk, and what risks will enter into play with new technology and business initiatives.

When considering developing a risk management plan, every chief information security officer (CISO) should take the following points into consideration. First, you really need to define your current level of risk exposure. This fluctuates with each internal change to networks, new external ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition

Most Read Articles

Log In

|  Forgot your password?