Uncategorized
Risk Treatment
Now that risk is identified, how do we address it? In information security, new risks surface daily. These new risks are the result of the evolving threat landscape, implementation of new technologies, changes in regulatory requirements, and potential for human error. In principle, there are six methods (treatments) to address Read more…