Sponsored by ComputerWeekly.com
This document discusses the different purposes of the two standards, how to reconcile the two with regard to terminology and process, and combine the best elements of both to produce a consistent, repeatable risk management process. Access >>>
Table of contents
- What Information is Necessary for Risk Analysis?
- How to use FAIR in your ISMS
- Define the Context for Information Risk Management
Premium Content for Free.
More Premium Content Accessible For Free
Social Media: IT Purchasers get social, marketers play catch up ?
IT decision makers are using social media effectively at work, but marketers are playing catch up, according to this research snapshot.
Can national security and privacy co-exist?
In this week’s Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how ...
Cultivating IT Talent
While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses...