Information security risk assessment is much more comprehensive than IT risk assessment – it has to take into account threats and vulnerabilities related not only to information technology, but also to employees, clients and partners, natural disasters, etc.
Dejan Kosutic, one of the leading ISO 27001 experts, explains how to link together assets, threats and vulnerabilities, and shows how to fill in the ISO 27001 risk assessment matrix (table) using a template document.
This unique video tutorial will enable you to perform the whole process in a much shorter time, and also ensure you didn’t forget some important risk that could cause damage later on.
Preview of chapters #1, #4 and #7:
Available as part of the following toolkits:
See Pricing & Options
ISO 27001 Free Downloads
Companies starting their risk assessment process, after they have written the Risk Assessment Methodology
Documentation presented In video:
Risk Assessment Table
Available as part of the toolkits listed below
Streaming video (delivered online)
2. ISO 27001 requirements
3. Structure of Risk Assessment Table template
4. Risk assessment process
5. Prerequisites for risk assessment
6. Options for risk assessment
7. Filling in the Risk Assessment Table document
See All Tutorials