HomeCommunityBest Responses to "22 Effective Information Security Risk Management Techniques"

Best Responses to “22 Effective Information Security Risk Management Techniques”

After publishing the article, “22 Effective Information Security Risk Management Techniques,” I asked the community for their feedback. What did they like, not like, and what did I miss?

I took my favorite responses and produced this video. It features quotes from:

  • Paul Lanzi, COO, Remediant
  • Elliot Lewis, CEO, Keyavi Data
  • Dutch Schwartz, strategic lead, AWS
  • Neil Saltman, sr. account executive, Anomali
  • Dr. Michael Barr, information systems engineer, US Army
  • Mison Riggins, information security senior advisor, Anthem

Give it a watch and do you have your feedback to the feedback?

Got feedback? Join the conversation on LinkedIn.

Thanks to our sponsor, Reciprocity

ZenGRC - Reciprocity - Information security risk management
ZenGRC by Reciprocity is an award-winning, cloud-based GRC software that automates and simplifies compliance and risk management, solving critical problems at scale while customizing to your business needs. Adhering to the majority of regulations is a snap with pre-built templates and a unified system of record. Learn more about information security risk management at reciprocitylabs.com.

Most Popular