Video Tutorial: How to Implement Risk Assessment According to ISO 27001
|Learn how to identify information security risks - assets, threats and vulnerabilities|
Information security risk assessment is much more comprehensive than IT risk assessment - it has to take into account threats and vulnerabilities related not only to information technology, but also to employees, clients and partners, natural disasters, etc.
Dejan Kosutic, one of the leading ISO 27001 experts, explains how to link together assets, threats and vulnerabilities, and shows how to fill in the ISO 27001 risk assessment matrix (table) using a template document.
This unique video tutorial will enable you to perform the whole process in a much shorter time, and also ensure you didn't forget some important risk that could cause damage later on.
|Preview of chapters #1, #4 and #7:||___||
Target audience: Companies starting their risk assessment process, after they have written the Risk Assessment Methodology
Document presented in video: Appendix 1 - Risk Assessment Table
Presenter: Dejan Kosutic
Access: Unlimited number of views immediately after payment
Duration: 21m 52s
Format: Streaming video (delivered online)
About Information Security & Business Continuity Academy (IS&BCA)
IS&BCA is a largest resource of knowledge and materials that helps companies from over 40 countries worldwide to implement ISO 27001, ISO 22301 and BS 25999-2. Our aim is to enable professionals to implement this important task with minimum effort and with a high level of satisfaction of top management.
If you are not satisfied with your video tutorial(s) for any reason, we'll give you your money back - contact us within 10 days of your purchase and we'll refund you 100% of your money. No questions asked – we guarantee it!
100% secure online billing
We use Secure Socket Layer (SSL) technology, the industry standard and among the best available today for secure online commerce transactions. All of your personal information, including credit card number, name, and address is encrypted so it cannot be read during transmission. You are protected by your credit card company in the case of a fraudulent transaction with any purchase.