Information Security Governance - Implementing risk managemen
7 important questions on Information Security Governance - Implementing risk managemen
Which factors do define the external environment in RM?
- Local market (competition, financial and political)
- Law and regulatory environment
- Social and cultural conditions
- External stakeholders
Which factors do determine the RM context?
- Cost - benefit balance
- Scope of risk management activities
- Range of processes or activities to be assessed
- Full scope of risk management activities
- Roles and responsibilities of participants
- Organizational culture in terms of risk adverseness or aggressiveness
Of which processes does the RM consist?
- Establish scope and boundaries
- Identify information assets and valuation
- Perform risk assessment
- Determine risk treatment or response
- Accept residual risk
- Communicate about and monitor risk
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
What are the 4 risk responses?
Avoid (terminate)
Mitigate (reduce the risk)
Transfer (share)
Accept (retain)
What are the requirements in all standardized RM frameworks?
- Policy
- Planning and resourcing
- Implementation program
- Management review
- Risk management process
- Risk management documentation
Which factors do define the internal environment?
- Key business drivers
- Organization's strengths, weaknesses, opportunities and threats
- Internal stakeholders
- Organization structure and culture
- Assets in terms of resources (people, systems, processes, capital)
- Goals and objectives
Where does GAP analysis in the context of RM refer to?
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding