Dark Reading: Six Steps To A Risk-Based Security Strategy
Developing a risk-based approach to IT security defense can be complicated. Here are some tips to help you navigate the maze
Dec 10, 2012
By Randy George
[Excerpted from "Six Steps To A Risk-Based Security Strategy," a new, free report posted this week on Dark Reading's Risk Management Tech Center.]
Achieving total security in an organization is impossible.
Once you have accepted this simple (but often hard-to-swallow) fact, you can move forward with a risk-based security strategy, in which priorities are established and decisions are made through a process of evaluating the sensitivity of data, the vulnerability of systems and applications, and the likelihood of threats. By making risk-based decisions, security organizations can develop more practical and realistic security goals, and spend their resources in a more effective way.
Click the URL above to read the full article
Votes:30