Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Tripwire > 10 Steps to Risk-Based Security Management
 

10 Steps to Risk-Based Security Management

White Paper Published By: Tripwire
Tripwire
Published:  Nov 07, 2012
Type:  White Paper
Length:  8 pages

Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment. While this disconnect is not uncommon, it is nonetheless disconcerting.

In response to this finding we felt it useful to offer guidance to those who wish to implement an RBSM program. We believe these recommendations will not only help you understand the general steps to take, but also provide indicators of your progress.




Tags : 
security, tripwire, security management, security based management, data center