*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***
With the ISO 27001
ISMS we attempt to
identify potential
threats and...
Upcoming SlideShare
Loading in …5
×

Threat Materialization diagram

522 views
439 views

Published on

Threat Materialization diagram

Published in: Business
2 Comments
2 Likes
Statistics
Notes
No Downloads
Views
Total views
522
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
42
Comments
2
Likes
2
Embeds 0
No embeds

No notes for slide

Threat Materialization diagram

  1. 1. *** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS *** With the ISO 27001 ISMS we attempt to identify potential threats and matching vulnerabilities and mitigate these risks before they result is unplanned expenses and damage to an organizations reputation. ‘Security Events’ are not the same as ‘Security Incidents’. Security events normally occur when a vulnerability exists and a threat agent attempts to exploit a vulnerability but is not successful. There is a subtle difference between information security ‘incidents’ and ‘events’ and while we may not be able to stop events from occurring we can learn from them and take correction and/or preventive action to mitigate of eliminate the risk. For more information contact, Skype; Mark_E_S_Bernard, Twitter; @MESB_TechSecure LinkedIn; http://ca.linkedin.com/in/markesbernard

×