“Let’s look at a ‘harmless’ example,” he says. “You came to an insurance company to issue CASCO insurance for your car, and the very next day you are bombarded services: insurance, maintenance, etc. Most likely, this means that someone from the insurance company ‘leaked’ your data. What is the likelihood that you will contact this insurer again? Now imagine how much greater the reputational risks of companies and your personal risks as a client are if something like this happens in the financial services or asset management services sector.
Recalling the existence of the ISO 31000 family of estonia whatsapp data concerning risk-oriented management and expert recommendations in this area, Sergey Samoilov, head of the network security and audit department at Axoft, nevertheless notes that there is no uniform risk management for all organizations. “There are, for example, tools for quantitative and qualitative risk assessment, absolute and relative expression of the degree of risk, subjective and objective methods of its assessment, but from them it is necessary to choose the tool that is most suitable in each specific situation,” he says.
Alexey Dankov, adding the domestic GOST R ISO/IEC 27005-2010 to the above-mentioned standards, believes that in practice the most common and effective method is expert risk assessment based on retrospective analysis and precedent experience and implying the monetization of risks (which makes assessments understandable for business). “For municipal and state structures,” he reminds, “it is important to assess risks taking into account compliance with regulatory requirements. It is useful to use risk management automation tools and damage assessment.”
By phone with offers of related
-
- Posts: 529
- Joined: Mon Dec 23, 2024 3:13 am