Luke Irwin Archive

How to achieve repeatable risk assessments

Information security risk assessments help organisations understand the threats they face and the treatment options they should consider. The assessment should be performed regularly – either once a year or whenever there are significant organisational changes – because the threat …

Creating a Centralised Cyber Risk Register

A centralised cyber security risk register is a document that includes information about an organisation’s threat environment. It contains information on potential cyber security risks. Usually it acts as evidence that an organisation has implemented an ISMS (information security management …