Most companies will have a cybersecurity team to deal with the increasing amounts of cyber crime and one of the key areas that they will adopt to protect the company is risk management.
In this chapter, we will first look at the importance of policies, plans, and procedures that need to be in place to help to protect an organization. We will look at standard operating procedures, agreement types, personnel management including background checks, exit interviews, NDA, and general security procedures.
Next, we will look at Business Impact Analysis concepts such as RTO, RPO, MTTR, and MTBF followed by the impact of mission essential functions, single point of failures, and the impact of disaster recovery.
A security IT professional needs to know about risk management processes and concepts. They need to know the different types of threat actors, how the complete risk...