How to Conduct a Cybersecurity Risk Assessment>
Medium – Knut Svendsen
This article provides a step-by-step guide for conducting a cybersecurity risk assessment to identify and prioritise potential threats to your business.
The first thing we need to do is to identify our critical assets. Dr. Eric Cole at Secure Anchor Consulting suggests you start with a simple table listing your top 5 critical assets, top five threats, and finally, top five vulnerabilities. Your assets may include your network, hardware, software and data your business depends.
We then assess the top five threats that can be exploited and the chance of the threats occurring. The next step is to implement the security controls that will mitigate the threats. The final point of discussion is monitoring.
Link: https://medium.com/@knutsvendsen/how-to-conduct-a-cybersecurity-risk-assessment-dc309597f6ab