Search results

122 items matching your search terms.
Filter the results.
Item type



















































New items since



Sort by relevance · date (newest first) · alphabetically
Information Security Risk Management training organised by ENISA and ESDC
27 experts from 9 members states and 4 EU institutions attended the two-day course at the branch office of ENISA in Heraklion, Crete.
Located in News / ENISA News
File Publicly Available Sources on Information Security Risks
Publicly Available Sources on Information Security Risks
Located in Topics / / Threat Landscape / Stock taking
File PDF document COIT Mitigation Stategies Published Version.pdf
Located in Topics / / Threat Landscape / ENISA Thematic Landscapes
Consumerization of IT: Risk Assessment and Risk Mitigation Strategies and Good Practices
ENISA has produced a risk and opportunity assessment and risk mitigation strategies in the area of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this work is to assess the risks and identify mitigation strategies, policies and controls for the assessed risks. At the same time, mitigation has been proposed in a way that leaves the windows for the realization of the assessed opportunities open.
Located in Topics / / Threat Landscape / ENISA Thematic Landscapes
Inventory of Risk Management / Risk Assessment Methods and Tools
Located in Topics / / Risk Management / Current Risk
Introduction
Located in Topics / / Current Risk / RM Inventory
The Risk Management Process
Located in Topics / / Current Risk / RM Inventory
Template
Template of Risk Management - Risk Assesment Methods
Located in Topics / / RM Inventory / RM/RA Methods
Austrian IT Security Handbook
Located in Topics / / RM Inventory / RM/RA Methods
Cramm
Located in Topics / / RM Inventory / RM/RA Methods

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information