Search results

According to the tag effective cybersecurity, the following results have been found:

How to improve the security risk assessment process in 4 steps

Hello, tekkix! My name is Irina, I am an information security analyst at Avito. In this article, I share our experience and my personal impressions of building the information security risk assessment and management process at Avito. I explain what was needed to launch and support the risk assessment process, the benefits of such an assessment, and how to keep up with trends. My story will be of interest not only to information security analysts, risk managers, but also to anyone interested in the topic of risk assessment.