How did the 2013 update change the ISO 27001 standard?

Enterprise Risk Management: Metrics and Assessments

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Compliance and risk modeling

    You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting compliance as a necessary evil, but aggressively teaming with their internal compliance and audit teams to... 

  • Understanding governance, risk and compliance frameworks

    Governance, risk and compliance frameworks, tools, and strategies are essential to the success of today’s corporate information security programs. This in-depth e-book explores all facets of GRC from the complexities of evaluating the right solution ... 

  • Top considerations for midmarket security

    This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Applicat... 

  • Keeping on top of risk management and data integrity essentials

    Risk management is vital for all enterprises, but for an oil company like ChevronTexaco and its Chief Information Protection Officer, Richard Jackson, the consequences of a risky drill site can last for decades. Also in this issue, read features on f... 

  • Chain of command: Inside Prudential's security management program

    Information Security's October 2003 issue examines the security management program at Prudential Financial and why it's processes and people are a rock of information security stability. Also in this issue: how to reduce insider risk, how the informa... 

  • Balancing act: Security resource planning helps manage IT risk

    Effective enterprise risk management is a challenging balancing act, demanding careful attention to vulnerabilities, policies, regulations, internal and external threats, and more. Our cover story looks at technology that promises to ease the burden,... 

  • USGCB (United States Government Configuration Baseline)

    The United States Government Configuration Baseline, or USGCB, is a government-wide initiative that provides guidance on information security configuration best practices for IT products leveraged by federal agencies. 

  • OCTAVE

    OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a security framework for determining risk level and planning defenses against cyber assaults. The framework defines a methodology to help organizations minimize exposure t... 

About Enterprise Risk Management: Metrics and Assessments

Get the help you need with your enterprise risk assessments, analysis and management framework. Learn the steps, assign roles and responsibilities, find the right tools, make use of standards and automate the process, plus decide what is and isn't acceptable risk.