Crown Jewels Risk Assessment: Cost Effective Risk Identification (RSA Conference 2017)

Enterprise security risk assessments are typically shallow or expensive due to the vastness of the systems and data. But a study on sensitive data found that the organization’s “crown jewels” (top 0.01% to 2.0% sensitive data) accounts for 70% of the value to the enterprise. This allows for a unique approach to performing a security risk assessment—namely the crown jewels approach.

Detailed Presentation :

(Source : RSA USA 2017)

Speaker : 

Doug Landoll

Doug Landoll is dynamic speaker and information security expert who always brings a unique mix of business strategy, keen insight and technical know-how to current information security topics. In his 25+ years in the industry, he has performed in roles as a Secure Coder and Product Evaluator for the NSA; assessed vulnerabilities in systems for the CIA, FBI and NATO; built security programs for corporations large and small; guided information security compliance initiatives for regulated industries; and instructed over 1500 CISSP and CISA candidates. Landoll authored the best-selling Security Risk Assessment Handbook, and the recent Information Security Policies, Procedures, and Standards. He holds a CS degree from JMU, and an MBA from UT, Austin.

8669813678?profile=original

Pre Register For SACON -  India's First Security Architecture Conference

Join 100+ CISOs and 200+ IT Security Professionals at an exclusive security architecture conference in the Silicon Valley Of India - Bangalore, in November 2017. Pre-Register and get special discount access and talk highlights.

>>Click Here To Pre Register & Avail Special Discounts

Votes: 0
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership