1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: Identify the “who” in risk mitigation

Discussion in 'CSO' started by RSS, Jun 29, 2016.

  1. RSS

    RSS New Member Member

    When it comes to risk mitigation, organizations need to focus on several components in order to develop and implement an effective strategy to counter a diverse range of cyber threats. While there is considerable focus, and rightly so, on being able to identify mission critical information assets and accesses in order to devise security plans to safeguard them, attention must also be given to the “who” of risk mitigation planning.

    The “who” becomes a bit more complex depending on the perspective being taken and further demonstrates the need for risk mitigation strategies to recognize different points of view when developing their plans.

    [ ALSO ON CSO: Insider threat mitigation techniques worth considering ]

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page