CISO

Five Data Types to Consider When Conducting a Risk Assessment

Play the latest episode
|
Feb 20, 2018
23 minutes

Subscribe

Listen to the Security Intelligence Podcast wherever you get your podcasts.

Five Data Types to Consider When Conducting a Risk Assessment
February 20, 2018
| |
< 1 min read

Listen to this podcast on iTunes, Soundcloud or wherever you find your favorite content.

Following the enthusiastic response to their “Get Smarter About Disaster Response — Five Resolutions For 2018” podcast earlier this year, Mitch Mayne and Loren Dealy Mahler are back to take a more in-depth look at the first resolution on their list: conducting a risk assessment.

Whether your organization is reviewing its current incident response policies and procedures or building something new, a risk assessment is the logical place to start. After all, you must know exactly what assets and data types need protecting in order to allocate your resources appropriately.

Listen now to learn about the five distinct data types your enterprise may hold or interact with, and why performing an effective risk assessment means widening your lens to view how a data breach might affect your organization’s reputation and business processes as well as its security posture.

Listen to the podcast

For more insights from Loren, visit the Communications War Room and check out Dealy Mahler Strategies. To hear more from Mitch, subscribe to the SecurityIntelligence podcast and never miss an episode.

Security Intelligence Staff
Security Intelligence Staff

Security Intelligence strives to be the leading site for technical and business-focused security content. Security is an essential factor for every business,...
read more

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today
Press play to continue listening
00:00 00:00