This document discusses risk management in cyber security. It begins by explaining the concept of risk management and how it has been applied to physical security measures. It then discusses how risk management principles are applied to cyber security, including identifying vulnerabilities, educating employees, and forming incident response teams. The document outlines the process of implementing a cyber security risk management system, including prioritizing assets, applying layered security, and documenting procedures. It also discusses risk mitigation strategies, incident response plans, and the role of cyber forensics in risk management.