Risky Business (Part 3): The Beauty of Risk Transfer
- by nlqip
Previously, I’ve talked about four primary risk treatment options: mitigate, avoid, accept, and transfer.
Over the history of the security industry, we’ve tended to focus on mitigation. Implementing controls is where the action is.
As IT has largely become a consumption model, I would argue that risk transfer is catching up with mitigation and becoming a primary approach for many companies. The new world of security is a more streamlined model that involves transferring many types of risk—and many of the associated controls—to third parties in a variety of ways.
Read the full article published February 7, 2018 here: https://www.securityweek.com/risky-business-part-3-beauty-risk-transfer by Security Week.
Source link
lol
Previously, I’ve talked about four primary risk treatment options: mitigate, avoid, accept, and transfer. Over the history of the security industry, we’ve tended to focus on mitigation. Implementing controls is where the action is. As IT has largely become a consumption model, I would argue that risk transfer is catching up with mitigation and becoming…
Recent Posts
- Arm To Seek Retrial In Qualcomm Case After Mixed Verdict
- Jury Sides With Qualcomm Over Arm In Case Related To Snapdragon X PC Chips
- Equinix Makes Dell AI Factory With Nvidia Available Through Partners
- AMD’s EPYC CPU Boss Seeks To Push Into SMB, Midmarket With Partners
- Fortinet Releases Security Updates for FortiManager | CISA