How to implement a risk-based security strategy: 5 steps

0
169

Merely conforming to cybersecurity standards, such as ISO/IEC 27001, or complying with regulatory requirements, such as PCI DSS, won’t automatically make an enterprise’s security complete, effective or economical. Meeting a standardized control baseline might check compliance boxes, but creating a strong risk-based strategy, building a resilient operating environment and hardening against evolving cyberthreats requires more.

This gap — the difference between the bare minimum and a strategic, formalized, resilience-based program — is what risk-based security is all about. A risk-based approach incorporates information about the organization — its goals, critical assets, context, threats — into security planning. It ensures resources are used optimally, context-specific circumstances are accounted for, and that real threats tie directly to deployed countermeasures.

Let’s look at what a risk-based security strategy involves and five steps security practitioners should follow when developing their plan.

What is risk-based security?

Security practitioners know that risk is a function of two factors:

  1. Impact. How bad a given outcome will be.
  2. Likelihood. The…

Read More…

Актуальные книги на английском