Learn to Conduct an IT Security Risk Assessment

Learn to Conduct an IT Security Risk Assessment
Author: ISACA
Date Published: 22 January 2020

Organizations must conduct regular risk assessments not only to ensure business continuity, but also to verify that their expenditures are providing a high return on investment. Risk assessments are becoming more and more complex, as the risk environment is rapidly evolving. Because of new risk factors that appear regularly, IT security professionals must constantly identify and address any new vulnerabilities.

With this need to regularly assess risk, it is imperative that organizations have a strong risk assessment plan and methodology that addresses the assets, their value, the business processes that rely on them, the organization’s risk appetite and risk mitigation options. The Conducting an IT Security Risk Assessment white paper explains how to conduct an IT security risk assessment, outlining the important questions organizations must answer to identify risk, how to determine the value of assets and how to protect them. This white paper is geared toward those who are unfamiliar with the security risk assessment process.

To download this complimentary white paper, visit the Conducting an IT Security Risk Assessment page of the ISACA website.