assets-treats-vulnerabilities

/assets-treats-vulnerabilities

ISO 31010: What to use instead of the asset-based approach for ISO 27001 risk identification

One of the most significant changes in the 2013 version of ISO 27001, a worldwide standard for Information Security Management Systems, is that it does not prescribe any approach in the risk assessment anymore. While it still requires the adoption of a process-based risk assessment approach (learn more here: ISO 27001 ...

The post ISO 31010: What to use instead of the asset-based approach for ISO 27001 risk identification appeared first on 27001Academy.

By | April 4th, 2016|assets-treats-vulnerabilities, Blog, BSI, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO 31010, ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, Risikomanagement, Risk Assessment, risk identification, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für ISO 31010: What to use instead of the asset-based approach for ISO 27001 risk identification

ISO 31010: What to use instead of the asset-based approach for ISO 27001 risk identification

One of the most significant changes in the 2013 version of ISO 27001, a worldwide standard for Information Security Management Systems, is that it does not prescribe any approach in the risk assessment anymore. While it still requires the adoption of a process-based risk assessment approach (learn more here: ISO 27001 ...

The post ISO 31010: What to use instead of the asset-based approach for ISO 27001 risk identification appeared first on 27001Academy.

By | April 4th, 2016|assets-treats-vulnerabilities, Blog, BSI, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO 31010, ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, Risikomanagement, Risk Assessment, risk identification, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für ISO 31010: What to use instead of the asset-based approach for ISO 27001 risk identification