Search
Exact matches only
Search in title
Search in content
Search in comments
Search in excerpt
Filter by Custom Post Type

Mitigating External or Insider Risk – A 5-Step Process

Mitigating risk requires a coordinated program for risk and security management, whether the attack originates externally or internally from disgruntled employees, contractors or supply-chain partners.

Saryu Nayyar, an internationally recognized cybersecurity expert, author, speaker and member of the Forbes Technology Council, presents a five-step program that provides a road map for mitigating threats in any environment. The five steps include:

  • Starting with the highest-risk users and entities
  • Implementing risk-based controls
  • Removing friction with risk-based authentication
  • Executing continuous mitigation
  • Acknowledging time is not on your side

Read Nayyar’s full post on her five-step framework via Homeland Security Today.com.

Similar Articles

Leave a Reply

Top
RSS
Follow by Email
LinkedIn
Share