Expert Advice Community

Fast-track information risk assessments

  Quote
Brian Created:   Apr 15, 2020 Last commented:   Apr 17, 2020

Fast-track information risk assessments

Hi,

I have very limited time to conduct risk assessments - usually no more than an hour at most.  I think it is important to hold a face-to-face consultation to capture the initial info then follow-up by e-mail for further details to cover the inevitable gaps.

How can I make the best use of the F2F time I have - what are the right questions to be asking when using a basic asset-threat-vulnerability methodology? 

I appreciate this will be subjective and depends on lots of other factors - I'm just looking for a general approach at this point.

Thanks,

Brian.

0 0

Assign topic to the user

ISO 27001 RISK ASSESSMENT AND TREATMENT REPORT

Document the results of the risk management process.

ISO 27001 RISK ASSESSMENT AND TREATMENT REPORT

Document the results of the risk management process.

Expert
Rhand Leal Apr 17, 2020

First is important to note that not all persons will give you direct answers about assets, threats, and vulnerabilities. This is because of their backgrounds (e.g., technical or non-technical), and knowledge about information security.

Broadly speaking, you should consider at least these questions to identify assets:

  • which information you have to deliver? To whom? (this last question will help direct you to the next person you should talk to)
  •  which information you need to do your work? From whom? (this last question will help you map if all relevant persons were already covered)
  • which resources you need to work on? (depending on the role of the person this can lead to general answers, like information system abc, or to a detailed list of assets)

For identification of threats and vulnerabilities, you should consider these questions:

  • In your opinion, what can negatively affect the information and resources you mentioned? And why?

In short, the questions have to be focused on the context of the interviewed and form their answer you have to mine the assets, threats, and vulnerabilities.

As a support tool, if you have experience and knowledge about the process involved, it is to build a checklist with the most common answers and try to validate them with the interviewed.

Quote
0 1

Comment as guest or Sign in

HTML tags are not allowed

Apr 15, 2020

Apr 17, 2020

Suggested Topics