ENISA
https://www.enisa.europa.eu
ISO/IEC 17799
https://www.enisa.europa.eu/topics/risk-management/current-risk/risk-management-inventory/rm-ra-methods/m_iso17799.html
No publisherRisk Management2012/11/23 15:05:00 GMT+2PageISO/IEC 13335-2
https://www.enisa.europa.eu/topics/risk-management/current-risk/risk-management-inventory/rm-ra-methods/m_iso133352.html
No publisherRisk Management2012/11/23 15:05:00 GMT+2PageISF Methods
https://www.enisa.europa.eu/topics/risk-management/current-risk/risk-management-inventory/rm-ra-methods/m_isf_methods.html
No publisherRisk Management2012/11/23 15:05:00 GMT+2PageISAMM
https://www.enisa.europa.eu/topics/risk-management/current-risk/risk-management-inventory/rm-ra-tools/t_isamm.html
No publisherRisk Management2012/11/23 15:05:00 GMT+2PageISAMM
https://www.enisa.europa.eu/topics/risk-management/current-risk/risk-management-inventory/rm-ra-methods/m_isamm.html
No publisherRisk Management2012/11/23 15:05:00 GMT+2PageInvesting in Security for ROI?
https://www.enisa.europa.eu/news/enisa-news/investing-in-security-for-roi
ENISA's new report "Return On Security Investment" initiates a discussion among the ‘Digital Fire Brigades’ or Computer Emergency Response Teams (CERTs) to create the basic tools and best practices to calculate their Return on Security Investment (ROSI) while it can operate as a tool to justify their business need and existence through their financial added value.No publisherCSIRTsCSIRTsRisk Management2012/12/12 00:00:00 GMT+2News ItemInventory of Risk Management / Risk Assessment Methods
https://www.enisa.europa.eu/topics/risk-management/current-risk/risk-management-inventory/rm-ra-methods/inventory-of-risk-management-risk-assessment-methods-1
No publisherRisk Management2015/05/25 15:55:00 GMT+2CollectionInventory of Risk Management / Risk Assessment Tools
https://www.enisa.europa.eu/topics/risk-management/current-risk/risk-management-inventory/rm-ra-tools/inventory-of-risk-management-risk-assessment-tools-1
ENISA has generated an inventory of Risk Management / Risk Assessment tools. A total of 12 tools have been considered. Similarly to the inventory of methods, each tool in the inventory has been described through a template. The template used consists of 22 attributes that describe characteristics of tools.No publisherRisk Management2015/05/25 16:21:00 GMT+2CollectionInventory of Risk Management / Risk Assessment Methods and Tools
https://www.enisa.europa.eu/topics/risk-management/current-risk/risk-management-inventory
No publisherRisk Management2009/07/24 13:50:00 GMT+2PageInventory of Business and IT Continuity Tools
https://www.enisa.europa.eu/topics/risk-management/current-risk/bcm-resilience/bc-tools
No publisherRisk Management2009/07/24 11:20:00 GMT+2PageInventory of Business and IT Continuity Methods
https://www.enisa.europa.eu/topics/risk-management/current-risk/bcm-resilience/bcm-methods
No publisherRisk Management2009/07/24 10:50:00 GMT+2PageIntroduction to Return on Security Investment
https://www.enisa.europa.eu/publications/introduction-to-return-on-security-investment
As for any organization, CERTs need to measure their cost-effectiveness, to justify their budget usage and provide supportive arguments for their next budget claim. But organizations often have difficulties to accurately measure the effectiveness and the cost of their information security activities. The reason for that is that security is not usually an investment that provides profit but loss prevention. So what is the right amount an organization should invest in protecting information?No publisherCSIRTsRisk Management2012/12/12 13:10:00 GMT+2Report/StudyIntroduction
https://www.enisa.europa.eu/topics/risk-management/current-risk/risk-management-inventory/introduction
No publisherRisk Management2009/07/24 14:25:00 GMT+2PageInteroperable EU Risk Management Framework
https://www.enisa.europa.eu/publications/interoperable-eu-risk-management-framework
This report proposes a methodology for assessing the potential interoperability of risk management (RM) frameworks and methodologies and presents related results. The methodology used to evaluate interoperability stemmed from extensive research of the literature, resulting in the use of certain RM framework features which were singled out for this purpose. These features, which were identified as relevant for the assessment of interoperability, are thoroughly described and analysed for each framework/methodology. More specifically, for certain functional features we make use of a four-level scale to evaluate the interoperability level for each method and each set of combined features.No publisherRisk Management2022/01/13 14:05:00 GMT+2Report/StudyInformation Security Risk Management training organised by ENISA and ESDC
https://www.enisa.europa.eu/news/enisa-news/information-security-risk-management-training-organised-by-enisa-and-esdc
27 experts from 9 members states and 4 EU institutions attended the two-day course at the branch office of ENISA in Heraklion, Crete.No publisherTrainingInformation SharingRisk ManagementNetwork and Information Security AwarenessCybersecurity Educationcybersecurity2019/09/16 14:30:00 GMT+2News Item