Transforming Information Security to
       Information Risk Management
                              Presented By:
      ...
Transforming Information Security to Information Risk Management
Transforming Information Security to Information Risk Management
Transforming Information Security to Information Risk Management
Transforming Information Security to Information Risk Management
Transforming Information Security to Information Risk Management
Transforming Information Security to Information Risk Management
Transforming Information Security to Information Risk Management
Transforming Information Security to Information Risk Management
Transforming Information Security to Information Risk Management
Transforming Information Security to Information Risk Management
Transforming Information Security to Information Risk Management
Transforming Information Security to Information Risk Management
Upcoming SlideShare
Loading in …5
×

Transforming Information Security to Information Risk Management

1,410 views
1,347 views

Published on

Why is security so difficult? Adversaries have fewer rules and more resources than most defenders. Today, security focuses on technology, and compliance is driving many security decisions. A risk management program headed by a chief risk officer, can bring a structured, organized approach to your company<92>s security. It provides feedback loops and checks-and-balance capabilities, ensures appropriate communication and collaboration between risk program and organization, and guarantees that a member from risk management is represented in key organizational activities. Find out the five key elements of a risk management program.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,410
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
100
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transforming Information Security to Information Risk Management

  1. 1. Transforming Information Security to Information Risk Management Presented By: John P. Pironti CGEIT, CISA, CISM, CISSP, ISSAP, ISSMP Chief Information Risk Strategist Getronics John P. Pironti, CGEIT, CISA, CISM, CISSP, ISSAP, ISSMP Transforming Information Security to Information Risk management April 27, 2008 Agenda • Current State of Information Security • Risk Management Versus Security • Risk Management Program • Final Thoughts 2 1

×