Item
Work Streams
Description
1
Vulnerability Scanning
 Scanning of systems, networks, and applications for known vulnerabilities.
2

Process Evaluation

Assessment of IT business processes that may impact the overall risk of the organization. 
3
Risk Factors
 Establishing the key attributes used in defining Risk.
4
Risk Level Matrix
Provide a standardized matrix for gauging the criticality of risks.
5
Risk Scoring Method
Quantifying risk across a global scale.


  • The ability to prioritize risk based on a risk scoring method, risk level, and risk factors.
  • A clear understanding of how both IT tools and infrastructure along with specific processes aids in reduction of overall risk. mostly via a layered approach to security.
  • Understanding of how Risk Preparation impacts the Risk Assessment.
  • The Risk Assessment process is flexible yet repeatable. Assuming nothing changes the results achieved yesterday should be a replica o f the results achieved tomorrow.  When changes do occur they should proportionately and accurately reflected.
  • Defining a clear scope by which the Assessment is to take place. Understanding the depth and breadth has a clear correlation to customer satisfaction.















The Risk Assessment is probably the most critical part of a Risk Management Lifecycle.  It is often the area which reveals the true nature of vulnerabilities or security gaps.  It sits between the Risk Preparation and Risk Action phase.


Netneering

Purpose:  A Risk Assessment is conducted to identify areas in your environment which are in need of improvements


Key Attributes:
Risk Management Lifecycle
























RIsk Assessment

At Netneering we understand the fundamental concepts of business mission driving security need.  This is why we seek to first understand your business before determining our exact approach in providing a security assessments.



SECURITY ENGINEERING & ARCHITECTURE