Hi! Thanks for your question. There are many different options out there. You can actually do this with a simple spreadsheet for smaller assessments. Or, you can could use something like SimpleRisk, PTAPro, or Eramba. The links are below. There are other options as well so be sure to research it so that it meets the needs of your organization. www.simplerisk.com/solutions/risk-management www.ptatechnologies.com/default.htm www.eramba.org/
Great lecture. But may I differ that much as data is the jewel we are protecting, methinks the 'container' itself - the server as an asset needs protection as well. And the threat in this case is theft. The vulnerability? Is any weakness of physical security.
Hi... I have one question. At some point in time you said "This server has no data, no attacker would care about it". However, what about those attackers whose goal is to compromise machines for crypto mining? Or to use them as bots in DDoS?
This was a straight up and most informative video I have ever watched on Qualitative vs Quantitative assessment analysis procedures. Thank you so much for your content!
gooood
Is there any popular open source risk assessment software that can be used?
Hi! Thanks for your question.
There are many different options out there. You can actually do this with a simple spreadsheet for smaller assessments.
Or, you can could use something like SimpleRisk, PTAPro, or Eramba. The links are below. There are other options as well so be sure to research it so that it meets the needs of your organization.
www.simplerisk.com/solutions/risk-management
www.ptatechnologies.com/default.htm
www.eramba.org/
Informative.
Thanks a million!
You are very welcome!
Great lecture. But may I differ that much as data is the jewel we are protecting, methinks the 'container' itself - the server as an asset needs protection as well. And the threat in this case is theft. The vulnerability? Is any weakness of physical security.
Hi... I have one question. At some point in time you said "This server has no data, no attacker would care about it". However, what about those attackers whose goal is to compromise machines for crypto mining? Or to use them as bots in DDoS?
@@BEINFOSEC agree. Thanks!
Truly easy to understand..
Loved the video. I have a seminar to be given on this topic next week and I am sure of getting A+
Thank you!
Thank you for this excellent video.
Whaat do you mean by the " other ALE"
...from another web server?
Very well explained risk assessment session. Thanks 👍
Tks for the work!
Thank you so much!
Great info, without experience how do I become a risk assessor?
@@BEINFOSEC thanks
that’s right dad
His dad is very very good
Good stuff.
Also phishing
Supper insightful
Information personal information security information
This was a straight up and most informative video I have ever watched on Qualitative vs Quantitative assessment analysis procedures. Thank you so much for your content!