What Is the Information Security Risk Management Process of ISO 27005?

iso 27005 featured

Businesses undergoing ISO certification are probably aware of the 27000 series and its focus on comprehensive cybersecurity. What many organizations don’t know, however, is that the series itself provides guidelines for risk managers to better implement Information Security Management Systems (the core process of ISO 27001) following best risk management practices. 

 

Read More

What Is NIST 800-161?

NIST 800-161 featured

With modern IT infrastructure becoming increasingly complex, intertwined systems managed through service providers and managing experts, the inevitable security problem rears its head. How can one organization, using several service providers, ensure their data security as it travels through those systems?

Over the past decade, enterprise and government specialists have refined the practice of risk management and security-focused on digital supply chain management. To support such efforts, the National Institute of Standards and Technology (NIST) released the newest revision, NIST 800-161, in May 2022. 

 

Read More

What Is a Risk Appetite Statement?

risk appetite featured

Over the past few weeks, we’ve talked quite a bit about risk:

  • What it is.
  • How it applies to compliance.
  • How you can start to think about it as an aspect of your overall business strategy. 

In many of the cases we’ve discussed, we’ve referred to risk in terms of mitigation–how to close the gap between your security capabilities and potential threats in the wild. 

But what’s critical to understand about risk is that it is just as much about how much risk you want to take on as you want to remove. And, when discussing potential risks concerning business goals, you must consider your risk appetite statement. 

 

Read More