The first stage in protecting your company is to identify your current information security risk.
This process assists Businesses in developing an organisational understanding of how to manage their current cyber security risk. This covers all facets of risk from systems and people, to assets, data and capabilities.
This enables the Business Owner to focus and prioritise its' efforts consistent with the needs of their business, in order to gain the best possible outcome.
Examples of outcome Categories within this Function include:
- Identifying physical and software assets within the organization to establish the basis of an Asset Management program.
- Identifying the Business Environment the organization supports including the organization’s role in the supply chain, and the organizations place in the critical infrastructure sector.
- Identifying cybersecurity policies established within the organization to define the Governance program as well as identifying legal and regulatory requirements regarding the cyber security capabilities of the organization.
- Identifying asset vulnerabilities, threats to internal and external organizational resources, and risk response activities as a basis for the organizations Risk Assessment.
- Identifying a Risk Management Strategy for the organization including establishing risk tolerances.
- Identifying a Supply Chain Risk Management strategy including priorities, constraints, risk tolerances, and assumptions used to support risk decisions associated with managing supply chain risks.