Chapter 10. Developing a Protection Strategy—Workshop A (Process 8A)

The stage is now set for you to address your most important security-related issues. The activities that you have completed to this point in the evaluation have enabled you to define your organization's unique information security risks and have laid a foundation for addressing those risks. You are ready to solve the puzzle.

The first workshop of process 8 marks the transition from identifying and characterizing risks to addressing them. In this workshop you develop both strategic and tactical solutions designed to manage the uncertainty your organization faces due to its information security risks. At the end of this workshop you will have produced a proposed protection strategy ...

Get Managing Information Security Risks: The OCTAVESM Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.