How to Build an Effective Information Security Risk Management Program

Comments

Comments are closed.

D Davidson at 09:01 on 11 Mar 2016

Rock solid. Detailed, thorough, and good estimates on stages / expected time to mature a risk program, differences between risk and audit, etc.

Paul Newman at 14:38 on 12 Mar 2016

Good information but wanted more illustrations of applicable scenarios, which is hard to fit into one hour