Skip navigation

This week’s blog I would like to address risk management an important matter that can quickly break a company if not properly implemented or simply not implemented at all.

One of the keys to protecting our information assets is to understand the risks associated with that asset and knowing out to mitigate those risks.  Risk in regards to information security is the likelihood that a threat will expose vulnerability in a system.  Once the risks have been identified, risk mitigation the second step of a risk management process involves prioritizing, evaluating, implementing and maintaining the appropriate risk reducing controls on our systems.

The elimination of all risk is impractical and/or impossible.  It is the responsibility of management to use the most cost effective approach and implement the most appropriate controls to decrease mission risk to an acceptable level, with minimal adverse impact on business resources and mission.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: