Risk assessment examples
Assign topic to the user
Answer: Our templates use asset-based risk assessment approach, so our available material goes in that direction.
As an example of process-based risk assessment I suggest you to take a look at this paper from GIAC:
- Performing a Process-Based Information Security Risk Assessment https://www.giac.org/paper/gsec/3776/performing-process-based-information-security-risk-assessment/106086
For other approaches I suggest you to take a look at ISO 31010, the IOS standard for methods and techniques for risk management. For information about IOS 31010, please see this article:
- ISO 31010: What to use instead of the asset-based approach for ISO 27001 risk identification https://advisera.com/27001academy/blog/2016/04/04/iso-31010-what-to-use-instead-of-the-asset-based-approach-for-iso-27001-risk-identification/
Comment as guest or Sign in
Mar 08, 2018