Category Archives: Meeting

Overview: This session will present the background of the regulations that call for information security risk analysis and show how it fits in to an overall information security management process. The risk analysis process will be presented within the context of the overall risk prioritization and risk mitigation process, using an example. The Information Security Risk Analysis Process presented utilizes a non-technical approach, involving interviewing staff knowledgeable about operation......
Featured articles