Dark Reading: Six Steps To A Risk-Based Security Strategy
Developing a risk-based approach to IT security defense can be complicated. Here are some tips to help you navigate the maze

Dec 10, 2012
By Randy George

[Excerpted from "Six Steps To A Risk-Based Security Strategy," a new, free report posted this week on Dark Reading's Risk Management Tech Center.]

Achieving total security in an organization is impossible.

Once you have accepted this simple (but often hard-to-swallow) fact, you can move forward with a risk-based security strategy, in which priorities are established and decisions are made through a process of evaluating the sensitivity of data, the vulnerability of systems and applications, and the likelihood of threats. By making risk-based decisions, security organizations can develop more practical and realistic security goals, and spend their resources in a more effective way.

Click the URL above to read the full article
Comments: 0
Votes:30