Читать книгу IT Security Risk Assessment A Complete Guide - 2020 Edition - Gerardus Blokdyk - Страница 7

Оглавление

CRITERION #1: RECOGNIZE


INTENT: Be aware of the need for change. Recognize that there is an unfavorable variation, problem or symptom.

In my belief, the answer to this question is clearly defined:

5 Strongly Agree

4 Agree

3 Neutral

2 Disagree

1 Strongly Disagree

1. Why is this needed?

<--- Score

2. Did you miss any major IT security risk assessment issues?

<--- Score

3. What do you need to start doing?

<--- Score

4. What are your needs in relation to IT security risk assessment skills, labor, equipment, and markets?

<--- Score

5. Who needs what information?

<--- Score

6. Do you need to avoid or amend any IT security risk assessment activities?

<--- Score

7. Do you need different information or graphics?

<--- Score

8. Are you dealing with any of the same issues today as yesterday? What can you do about this?

<--- Score

9. What prevents you from making the changes you know will make you a more effective IT security risk assessment leader?

<--- Score

10. Who should resolve the IT security risk assessment issues?

<--- Score

11. What IT security risk assessment capabilities do you need?

<--- Score

12. How do you identify the kinds of information that you will need?

<--- Score

13. What resources or support might you need?

<--- Score

14. For your IT security risk assessment project, identify and describe the business environment, is there more than one layer to the business environment?

<--- Score

15. What information do users need?

<--- Score

16. Will new equipment/products be required to facilitate IT security risk assessment delivery, for example is new software needed?

<--- Score

17. How do you recognize an objection?

<--- Score

18. Are there IT security risk assessment problems defined?

<--- Score

19. What are the minority interests and what amount of minority interests can be recognized?

<--- Score

20. What situation(s) led to this IT security risk assessment Self Assessment?

<--- Score

21. Do you know what you need to know about IT security risk assessment?

<--- Score

22. Does the problem have ethical dimensions?

<--- Score

23. What do employees need in the short term?

<--- Score

24. What is the problem and/or vulnerability?

<--- Score

25. Are there regulatory / compliance issues?

<--- Score

26. What would happen if IT security risk assessment weren’t done?

<--- Score

27. Would you recognize a threat from the inside?

<--- Score

28. How can auditing be a preventative security measure?

<--- Score

29. How are the IT security risk assessment’s objectives aligned to the group’s overall stakeholder strategy?

<--- Score

30. What activities does the governance board need to consider?

<--- Score

31. Which information does the IT security risk assessment business case need to include?

<--- Score

32. What is the problem or issue?

<--- Score

33. What are the stakeholder objectives to be achieved with IT security risk assessment?

<--- Score

34. As a sponsor, customer or management, how important is it to meet goals, objectives?

<--- Score

35. Who needs budgets?

<--- Score

36. How do you identify subcontractor relationships?

<--- Score

37. Which issues are too important to ignore?

<--- Score

38. What should be considered when identifying available resources, constraints, and deadlines?

<--- Score

39. What extra resources will you need?

<--- Score

40. Where do you need to exercise leadership?

<--- Score

41. What IT security risk assessment coordination do you need?

<--- Score

42. To what extent does each concerned units management team recognize IT security risk assessment as an effective investment?

<--- Score

43. What IT security risk assessment problem should be solved?

<--- Score

44. Is it needed?

<--- Score

45. Which needs are not included or involved?

<--- Score

46. How does it fit into your organizational needs and tasks?

<--- Score

47. What training and capacity building actions are needed to implement proposed reforms?

<--- Score

48. Are employees recognized or rewarded for performance that demonstrates the highest levels of integrity?

<--- Score

49. What IT security risk assessment events should you attend?

<--- Score

50. To what extent would your organization benefit from being recognized as a award recipient?

<--- Score

51. Who needs to know about IT security risk assessment?

<--- Score

52. What is the smallest subset of the problem you can usefully solve?

<--- Score

53. Does your organization need more IT security risk assessment education?

<--- Score

54. Can management personnel recognize the monetary benefit of IT security risk assessment?

<--- Score

55. What does IT security risk assessment success mean to the stakeholders?

<--- Score

56. Are there any specific expectations or concerns about the IT security risk assessment team, IT security risk assessment itself?

<--- Score

57. What are the expected benefits of IT security risk assessment to the stakeholder?

<--- Score

58. How do you assess your IT security risk assessment workforce capability and capacity needs, including skills, competencies, and staffing levels?

<--- Score

59. What are the IT security risk assessment resources needed?

<--- Score

60. Who are your key stakeholders who need to sign off?

<--- Score

61. Consider your own IT security risk assessment project, what types of organizational problems do you think might be causing or affecting your problem, based on the work done so far?

<--- Score

62. Will a response program recognize when a crisis occurs and provide some level of response?

<--- Score

63. How do you take a forward-looking perspective in identifying IT security risk assessment research related to market response and models?

<--- Score

64. Does IT security risk assessment create potential expectations in other areas that need to be recognized and considered?

<--- Score

65. Think about the people you identified for your IT security risk assessment project and the project responsibilities you would assign to them, what kind of training do you think they would need to perform these responsibilities effectively?

<--- Score

66. Whom do you really need or want to serve?

<--- Score

67. What needs to be done?

<--- Score

68. Are losses recognized in a timely manner?

<--- Score

69. What else needs to be measured?

<--- Score

70. Are there recognized IT security risk assessment problems?

<--- Score

71. Who needs to know?

<--- Score

72. Is it clear when you think of the day ahead of you what activities and tasks you need to complete?

<--- Score

73. What vendors make products that address the IT security risk assessment needs?

<--- Score

74. Are problem definition and motivation clearly presented?

<--- Score

75. How many trainings, in total, are needed?

<--- Score

76. What is the IT security risk assessment problem definition? What do you need to resolve?

<--- Score

77. Are employees recognized for desired behaviors?

<--- Score

78. What are the timeframes required to resolve each of the issues/problems?

<--- Score

79. What needs to stay?

<--- Score

80. Who defines the rules in relation to any given issue?

<--- Score

81. Are there any revenue recognition issues?

<--- Score

82. What are the clients issues and concerns?

<--- Score

83. Will IT security risk assessment deliverables need to be tested and, if so, by whom?

<--- Score

84. When a IT security risk assessment manager recognizes a problem, what options are available?

<--- Score

85. Are your goals realistic? Do you need to redefine your problem? Perhaps the problem has changed or maybe you have reached your goal and need to set a new one?

<--- Score

86. What problems are you facing and how do you consider IT security risk assessment will circumvent those obstacles?

<--- Score

87. Looking at each person individually – does every one have the qualities which are needed to work in this group?

<--- Score

88. Who else hopes to benefit from it?

<--- Score

89. How much are sponsors, customers, partners, stakeholders involved in IT security risk assessment? In other words, what are the risks, if IT security risk assessment does not deliver successfully?

<--- Score

90. How are training requirements identified?

<--- Score

91. How are you going to measure success?

<--- Score

92. What is the extent or complexity of the IT security risk assessment problem?

<--- Score

Add up total points for this section: _____ = Total points for this section

Divided by: ______ (number of statements answered) = ______ Average score for this section

Transfer your score to the IT security risk assessment Index at the beginning of the Self-Assessment.

IT Security Risk Assessment A Complete Guide - 2020 Edition

Подняться наверх