



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A practical guide to applying risk management principles. It outlines the steps involved in identifying, analyzing, and mitigating risks, and includes examples of common vulnerabilities and their corresponding mitigation strategies. The document also references relevant resources for further study.
Typology: Slides
1 / 5
This page cannot be seen from the preview
Don't miss anything!
Applying Risk Management Consulting Brian Joell 19 June 2018 CMBT/430/Week 2 Ongart Ratchaworap
Vulnerability Related Risk Mitigation Opening spam emails Trojan Horses, Malware, Spyware can corrupt or delete data on your computer Ensure firewalls are set and make sure data is encrypted using SSL (Secure Socket Layer) Non-compliance of policies Financial Loss, Damage to reputation, Franchise value and Legal penalties Ensure that employees are given a risk-based ethics and compliance training strategy session that’s intended to educate them about legal and policy documents Thumb Drives Unauthorized use of operating system configurations typically allow most programs (including malicious ones) to run automatically. This is best done by changing the computer's default auto run policies
Airmic. (2017). A structured approach to Enterprise Risk Management (ERM) and the requirements of ISO 31000. Theirm.org. Retrieved from https://www.theirm.org/media/886062/ISO3100_doc.pdf Kaplan, R., Mikes, A. (2012, June). Managing Risks: A New Framework. Harvard Business Review. Hbr.org. Retrieved from https://hbr.org/2012/06/managing- risks-a- new-framework NIST. (2010, February). Guide for Applying Management Framework to Federal Information Systems. NIST.com. Retrieved from https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-37r1.pdf