Tag Archives: risk analysis

Interactive VCDB

If you are new to the VCDB (Vocabulary for Event Recording and Incident Sharing Community Database), you are in for a treat. It’s a nice interface to gather information on incidents.

Posted in Security Blog | Tagged , , , | Comments Off on Interactive VCDB

Mid-year 2014 Data Breaches Exposed

2014 is going to replace 2013 as the highest year on record for exposed records, according to Risk Based Security. Mid-year 2014 at a Glance … • There were 1331 incidents reported during the first six months of 2014 exposing … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Mid-year 2014 Data Breaches Exposed

PRINCE2 Risk Management

22 minutes of your time and you will learn PRINCE2 Risk Management.

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on PRINCE2 Risk Management

The Ponemon Institute’s Data Breach Study

In my opinion, the Ponemon Institute’s Cost of Data Breach Study is eye-opening. If you use a GRC tool that associates dollar amount loss per record, you should probably read this report and make the necessary changes. Increasing the cost … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on The Ponemon Institute’s Data Breach Study

iRisk

iRisk, or the iRisk equation is another quantitative analysis formula. Like most quantitative analysis models, you solve for the risk by calculating the threat and vulnerability, and lower the risk when mitigating or compensating controls are added. Here is where … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on iRisk

What’s the Risk?

When asked, what’s the risk? I find great pleasure in flexing my ability to break down potential loss in either qualitative or quantitative methods. The FAIR Quantitative Risk Model was taught to me by Jack Jones, the creator. I also … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on What’s the Risk?

Bruce Schneier: The Security Mirage

My CISO brought this up today, so I’m posting it to watch it.

Posted in Security Blog | Tagged , , , , , , | Comments Off on Bruce Schneier: The Security Mirage

Facilitated Risk Analysis Process (FRAP)

Though I prefer a quantitative risk analysis, such as Factor Analysis of Information Risk (FAIR), sometimes a quicker method, such as the Facilitated Risk Analysis Process (FRAP), a qualitative method is needed. Qualitative methods are much quicker, they don’t require … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Facilitated Risk Analysis Process (FRAP)