NIST SP 800-30
Risk Management Process
Risk Assessment (RA)
Risk Concepts
Risk Models
Assessment Approaches
Analysis Approaches
Cultural Effects
Risk Assessment Application
Organizational Tier
Mission/Business Process Tier
Information Systems Tier
Communication & Info Sharing
The Process
Contact Us
IT Security Risk Management (ITSRM)
Conducting R
isk Assessments
Risk Assessment Supports Enterprise-Wide Risk Management
Organizations depend on information technology (IT) to successfully carry out their missions and business functions. IT can include diverse entities ranging from office networks, financial and personnel systems to specialized systems (e.g. process control, weapons, telecommunications,   and environmental control systems).

Information systems are subject to serious threats that can have adverse effects on organizational operations and assets, individuals, other organizations, and the Nation by exploiting both known and unknown vulnerabilities to compromise the confidentiality, integrity, or availability of the information being processed, stored, or transmitted by those systems. 

Threats to information systems can include purposeful attacks, environmental disruptions, human/machine errors, and structural failures, and can result in harm to the national and economic security interests of the United States.
Therefore, it is imperative that leaders and managers at all levels understand their responsibilities and are held accountable for managing information security risk - that is, the risk associated with the operation and use of information systems that support the missions and business functions of their organizations.  The contents of our Risk Assessment/Management offering reflects guidelines from NIST SP 800-30 (Guide for Conducting Risk Assessments)) and NIST SP 800-53 (Recommended Security Controls) with user-friendly tools to implement these guidelines.
Security Begins and Ends with You!

  Why You Need Our Product    |    Where Our Product Fits   |   PURCHASE PRODUCT