<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Risk Assessment in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32574#M2296</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;i have recently tasked to perform risk assessment of our organization data centre, pls help me how and where to start the process.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 10 Feb 2020 08:13:22 GMT</pubDate>
    <dc:creator>tanveer</dc:creator>
    <dc:date>2020-02-10T08:13:22Z</dc:date>
    <item>
      <title>Risk Assessment</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32574#M2296</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;i have recently tasked to perform risk assessment of our organization data centre, pls help me how and where to start the process.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 08:13:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32574#M2296</guid>
      <dc:creator>tanveer</dc:creator>
      <dc:date>2020-02-10T08:13:22Z</dc:date>
    </item>
    <item>
      <title>Re: Risk Assessment</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32575#M2297</link>
      <description>&lt;P&gt;There are a number of InfoSec risk assessment methods, but looking at something like ISO 27005 would be a reasonable place to start.&amp;nbsp; It's easy to get lost in the techniques involved in each method, which is why I'd suggest sticking with something simple.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It'd also be worth examining how you'd fit your risk assessment process in with any other risk management methods in use within your organisation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 09:23:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32575#M2297</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2020-02-10T09:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: Risk Assessment</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32576#M2298</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;There are a number of InfoSec risk assessment methods, but looking at something like ISO 27005 would be a reasonable place to start.&amp;nbsp; It's easy to get lost in the techniques involved in each method, which is why I'd suggest sticking with something simple.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It'd also be worth examining how you'd fit your risk assessment process in with any other risk management methods in use within your organisation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;i am in process of building risk register below are the fields. pls suggest is it oK to start with.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="0" width="1750" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="87" height="28"&gt;risk id&lt;/TD&gt;&lt;TD width="287"&gt;risk description&lt;/TD&gt;&lt;TD width="105"&gt;risk owner&lt;/TD&gt;&lt;TD width="104"&gt;risk cause&lt;/TD&gt;&lt;TD width="95"&gt;likehood&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD width="81"&gt;impact&lt;/TD&gt;&lt;TD width="119"&gt;impact type&lt;/TD&gt;&lt;TD width="169"&gt;Inherit risk rating&lt;/TD&gt;&lt;TD width="127"&gt;Residual Risk&lt;/TD&gt;&lt;TD width="245"&gt;recommended mitigation&lt;/TD&gt;&lt;TD width="180"&gt;treatement owner&lt;/TD&gt;&lt;TD width="151"&gt;treatment date&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="45"&gt;R1&lt;/TD&gt;&lt;TD width="287"&gt;data ceter may go down and availablity can be impacted&lt;/TD&gt;&lt;TD&gt;DGIT&lt;/TD&gt;&lt;TD width="104"&gt;High surge from Grid&lt;/TD&gt;&lt;TD&gt;Moderate&lt;/TD&gt;&lt;TD&gt;VERY HIGH&lt;/TD&gt;&lt;TD&gt;financial&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD width="245"&gt;SURGE ARRESTOR SHOULD BE INSTALLED&lt;/TD&gt;&lt;TD&gt;MANAGER NEWORK&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="159"&gt;R2&lt;/TD&gt;&lt;TD width="287"&gt;Authorize staff is unable to manage card access, change authorization levels or verify card holder identity and they can not use any web-based applications. Access control doors and video cameras may lose their connection to the system during a server failure.&lt;/TD&gt;&lt;TD&gt;DGIT&lt;/TD&gt;&lt;TD width="104"&gt;Access Control Server Failure&lt;/TD&gt;&lt;TD&gt;LOW&lt;/TD&gt;&lt;TD&gt;High&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD width="245"&gt;cluster software installed on multiple server&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Mon, 10 Feb 2020 09:34:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32576#M2298</guid>
      <dc:creator>tanveer</dc:creator>
      <dc:date>2020-02-10T09:34:15Z</dc:date>
    </item>
    <item>
      <title>Re: Risk Assessment</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32578#M2299</link>
      <description>&lt;P&gt;Fields you'll probably need to capture, but not all will be populated for all risks, given some result from human agency and some for natural causes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unique Id - unique id for the risk&lt;/P&gt;&lt;P&gt;Data Identified - when was the risk first identified&lt;/P&gt;&lt;P&gt;Threat Source - the source of a threat may be different from the specific actor involved e.g. organised crime&lt;/P&gt;&lt;P&gt;Threat Actor - the actor who causes a threat may be different from the source e.g. malware author hired to target particular firm by organised crime&lt;/P&gt;&lt;P&gt;Threat Description - a description of what the threat is e.g. theft of mobile assets&lt;/P&gt;&lt;P&gt;Inherent Likelihood - description of probability&lt;/P&gt;&lt;P&gt;Inherent Impact Description - stakes that what of impacts&lt;/P&gt;&lt;P&gt;Inherent Impact - states the aggregate cost if the risk is realised&lt;/P&gt;&lt;P&gt;Generic treatment option - avoid, transfer/share, reduce or accept&lt;/P&gt;&lt;P&gt;Current controls - the controls that are currently in place that affect likelihood or impact.&amp;nbsp; Also record the type of control i.e. deter, prevent, detect, response, recovery&lt;/P&gt;&lt;P&gt;Cost of current controls - capture the costs associated with operating the controls&lt;/P&gt;&lt;P&gt;Current Likelihood - in recognition that there will be controls in place&lt;/P&gt;&lt;P&gt;Current Impact -&amp;nbsp;in recognition that there will be controls in place&lt;/P&gt;&lt;P&gt;Target Likelihood - this will relate to if the current level is still above risk appetite&lt;/P&gt;&lt;P&gt;Target Impact -&amp;nbsp;in recognition that there will be controls in place&lt;/P&gt;&lt;P&gt;Treatment plan - actions required to get to target level&lt;/P&gt;&lt;P&gt;Risk Owner - who if the organisation at senior level owns the risk.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Risk Manager - who is implementing the current treatment plan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You may also want to consider how the risks can be structured to avoid duplicates/overlaps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 10:40:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32578#M2299</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2020-02-10T10:40:25Z</dc:date>
    </item>
    <item>
      <title>Re: Risk Assessment</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32579#M2300</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 10:44:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32579#M2300</guid>
      <dc:creator>tanveer</dc:creator>
      <dc:date>2020-02-10T10:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: Risk Assessment</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32582#M2301</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1343421387"&gt;@tanveer&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;i have recently tasked to perform risk assessment of our organization data centre, pls help me how and where to start the process.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Tanveer,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please tells what research you have done on the topic of risk assessment, particularly what resources (books, standards, journals, etc.) you have identified as possible guides. With that information, &amp;nbsp;the members here will be able to give you pros and cons on different frameworks and processes you might be able to use. One framework already identified for you is &lt;STRONG&gt;&lt;A href="https://www.iso.org/isoiec-27001-information-security.html" target="_blank" rel="noopener"&gt;ISO/IEC 27001&lt;/A&gt;&lt;/STRONG&gt;, &lt;SPAN&gt;&lt;STRONG&gt;&lt;A href="https://community.isc2.org/t5/forums/replypage/board-id/tech-talk/message-id/2296https://community.isc2.org/t5/forums/replypage/board-id/tech-talk/message-id/2296" target="_blank" rel="noopener"&gt;Information technology&amp;nbsp;— Security techniques&amp;nbsp;— Information security management systems&amp;nbsp;— Requirements&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;but there are others that may also be helpful. I suggest you investigate is NIST Special Publication (&lt;STRONG&gt;&lt;A href="https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final" target="_blank" rel="noopener"&gt;SP) 800-30 Rev. 1&lt;/A&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;A href="https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final" target="_blank" rel="noopener"&gt;Guide for Conducting Risk Assessments&lt;/A&gt;&lt;/STRONG&gt;, and&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://csrc.nist.gov/publications/detail/sp/800-37/rev-2/final" target="_blank" rel="noopener"&gt;SP 800-37,&amp;nbsp;Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy&lt;/A&gt;&lt;/STRONG&gt;. SP 800-30 and 800-37, like all NIST publications, are free.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will have to invest some money for some of the resources, and time in studying them. Although a few ISO/IEC standards are free, many are not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good luck!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 12:59:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32582#M2301</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2020-02-10T12:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: Risk Assessment</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32595#M2303</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1343421387"&gt;@tanveer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Like the other said, there are frameworks to build. &amp;nbsp;like NIST 800-37 RMF, or you can use COBIT 5.&lt;/P&gt;&lt;P&gt;Starting from asset identification, identify key business process, threat modelling and estimating the likelihood and impact, then building risk scenarios and finally those risk scenarios will go to the risk register.&amp;nbsp;&lt;/P&gt;&lt;P&gt;COBIT 5 is from ISACA but if you google COBIT 5 risk scenarios and COBIT 5 risk register, there are many samples on the internet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 15:49:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32595#M2303</guid>
      <dc:creator>csjohnng</dc:creator>
      <dc:date>2020-02-10T15:49:09Z</dc:date>
    </item>
    <item>
      <title>Re: Risk Assessment</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32596#M2304</link>
      <description>&lt;P&gt;should i start to identify asset or identify risk i.e asset based risk assessment or risk based risk assessment,&amp;nbsp;&lt;/P&gt;&lt;P&gt;view the fields which i mentioned in above reply.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 16:57:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32596#M2304</guid>
      <dc:creator>tanveer</dc:creator>
      <dc:date>2020-02-10T16:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: Risk Assessment</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32604#M2306</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1343421387"&gt;@tanveer&lt;/a&gt;&amp;nbsp;&amp;nbsp; The normal process is to actually identify the assets, categorise it - remembering many assets can actually be either tangible i,e. physical or intangible i.e. they can be information or data.&amp;nbsp; Plus see if you can also identify whether the particular assets have an owner or someone who is responsible for them too.&amp;nbsp; It would also be useful to put down where they are located and any other general observations such are they protected physically and by what etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This all helps you build up a picture of what, where, how information about the assets themselves.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 18:16:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32604#M2306</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-02-10T18:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: Risk Assessment</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32607#M2307</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1343421387"&gt;@tanveer&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;should i start to identify asset or identify risk i.e asset based risk assessment or risk based risk assessment,&amp;nbsp;&lt;/P&gt;&lt;P&gt;view the fields which i mentioned in above reply.&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Tanveer,&lt;/P&gt;&lt;P&gt;I fear you are asking for more hand-holding and detailed instruction in the arena of risk management and risk assessment than is appropriate or possible for even wise old (&lt;EM&gt;and highly opinionated&lt;/EM&gt;) folks on this forum .I suggest it is time for you to go read (at least skim for overall familiarity)&amp;nbsp;&lt;A href="https://community.isc2.org/t5/forums/replypage/board-id/tech-talk/message-id/2296https://community.isc2.org/t5/forums/replypage/board-id/tech-talk/message-id/2296" target="_blank" rel="noopener"&gt;ISO/IEC 27001&lt;/A&gt;, &lt;A href="https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final" target="_blank" rel="noopener"&gt;NIST SP 800-30&lt;/A&gt;,&lt;A href="https://www.isaca.org/resources/cobit" target="_blank" rel="noopener"&gt;ISACA COBIT&lt;/A&gt;, and the &lt;A href="https://www.cisecurity.org/controls/" target="_blank" rel="noopener"&gt;Center for Internet Security (CIS) Top 20 Controls&lt;/A&gt;, then come back here when you have specific question based on your knowledge of those important references.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Knowledge of all of those resources is very important grounding for every CISSP, no matter which domain(s) we operate in.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on the nature of your own organization, you will have to decide, with internal consultation, which framework to follow and how deep to pursue the assessment details. You can go for two page quick and dirty or large team big book, or anywhere in between.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good luck!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;p.s. I see your CISSP badge here on the forum is brand new (2/10/2020). I realize that could be the date you joined the forum, but if that is recently earned, congratulations!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 18:57:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32607#M2307</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2020-02-10T18:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: Risk Assessment</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32613#M2309</link>
      <description>&lt;P&gt;The first step is your risk assessment is the asset inventory. Discuss with business owners, services managers to have a first high level view of the assets and proceed further with a business impact analysis of the assets. Once you have this high level view, you can move further to a detailed assessment.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 22:28:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32613#M2309</guid>
      <dc:creator>JoshuaGabriel</dc:creator>
      <dc:date>2020-02-10T22:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: Risk Assessment</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32620#M2310</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1343421387"&gt;@tanveer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Like I am preparing for CRISC Exam domain 1... or answering the MC..&lt;/P&gt;&lt;P&gt;First thing first is to identify asset which support your enterprise's critical business.&amp;nbsp;&lt;/P&gt;&lt;P&gt;if there is no asset, there is no vulnerability and threat and you won't have any risk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And then you can have a risk based approach on the risk assesment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2020 01:26:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32620#M2310</guid>
      <dc:creator>csjohnng</dc:creator>
      <dc:date>2020-02-11T01:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: Risk Assessment</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32621#M2311</link>
      <description>&lt;P&gt;Assets are not limited to tangible ones. There are also intangible assets to be taken into account. Your organization cannot have "no assets".&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2020 01:31:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32621#M2311</guid>
      <dc:creator>JoshuaGabriel</dc:creator>
      <dc:date>2020-02-11T01:31:59Z</dc:date>
    </item>
    <item>
      <title>Re: Risk Assessment</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32625#M2312</link>
      <description>&lt;P&gt;A risk assessment of an entire data center. You are going to have a busy year my friend! There are so many parts to consider from physical security of the perimeter all the way down to the application themselves. Where do you plan to start? It is a huge undertaking and understanding the business drivers and the "environmental risks' (e.g., natural hazards, and geo-political) is key to cataloging the right risks against your assets. I see lots of sound advice to align to ISO/IEC 27001 and that is good if you are thinking of eventually certifying the location - that helps win business. The ISO/IEC standard "clauses" will also give you requirements that you can audit to when building out your register.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2020 04:11:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32625#M2312</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2020-02-11T04:11:45Z</dc:date>
    </item>
    <item>
      <title>Re: Risk Assessment</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32630#M2313</link>
      <description>&lt;P&gt;If aiming to certify the organisation or part of its hosting operation it makes sense to adopt an outside in approach to the risk assessment.&amp;nbsp; And by that I mean after clarifying the organisation of security; the senior sponsorship etc, to start with the physical and environmental risks.&amp;nbsp; You can be assessing those and ensuring that there are controls in place without identifying individual systems and owners.&amp;nbsp; Similarly with the personnel security risks/controls.&amp;nbsp; There will be whole categories of risks that are not system specific, so don't get lost down that particular rabbit hole.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2020 09:41:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Risk-Assessment/m-p/32630#M2313</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2020-02-11T09:41:18Z</dc:date>
    </item>
  </channel>
</rss>

