{"id":111,"date":"2013-04-16T09:16:23","date_gmt":"2013-04-16T14:16:23","guid":{"rendered":"https:\/\/www.softwareab.net\/wordpress\/?p=111"},"modified":"2013-05-01T13:48:48","modified_gmt":"2013-05-01T18:48:48","slug":"whitepaper-03-03-three-risk-management-methodologies","status":"publish","type":"post","link":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/","title":{"rendered":"Whitepaper 03-03: Three Risk Management Methodologies"},"content":{"rendered":"<p><a href=\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/Risk-Management-and-Methodologies.pdf\">Click here to download &#8220;Risk Management Methodologies&#8221; now!<\/a><\/p>\n<p>Companies thrive based on the results of their business decisions: from headliners (invest in cloud computing or\u00c2\u00a0upgrade servers?); to managerial (add resources to an executing project?); to operational (is it time to replace\u00c2\u00a0disk drives within our servers?). Correct and secure information assets provide the foundation for all of these\u00c2\u00a0decisions, and senior management must be able to demonstrate their fiduciary responsibility in protectingthese assets. This white paper analyzes three Risk Management (RM) methodologies:<br \/>\n<!--more--><\/p>\n<ul>\n<li><span style=\"line-height: 1.714285714; font-size: 1rem;\"><em>Identify<\/em> and classify information assets and their vulnerabilities;<\/span><\/li>\n<li><span style=\"line-height: 1.714285714; font-size: 1rem;\"><em>Prioritize<\/em> threats to those assets; and,<\/span><\/li>\n<li><span style=\"line-height: 1.714285714; font-size: 1rem;\"><em>Apply<\/em> cost-effective controls to reduce risks to those assets to acceptable levels.<\/span><\/li>\n<\/ul>\n<p>By providing a firm information foundation upon which decision-makers at every level in the company can\u00c2\u00a0depend, Risk Management helps to ensure that each business decision is made using the best data possible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Click here to download &#8220;Risk Management Methodologies&#8221; now! Companies thrive based on the results of their business decisions: from headliners (invest in cloud computing or\u00c2\u00a0upgrade servers?); to managerial (add resources to an executing project?); to operational (is it time to &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"more-link\" href=\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/\"> <span class=\"screen-reader-text\">Whitepaper 03-03: Three Risk Management Methodologies<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[16,13,14],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Whitepaper 03-03: Three Risk Management Methodologies - softwareab<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Whitepaper 03-03: Three Risk Management Methodologies - softwareab\" \/>\n<meta property=\"og:description\" content=\"Click here to download &#8220;Risk Management Methodologies&#8221; now! Companies thrive based on the results of their business decisions: from headliners (invest in cloud computing or\u00c2\u00a0upgrade servers?); to managerial (add resources to an executing project?); to operational (is it time to &hellip; Whitepaper 03-03: Three Risk Management Methodologies Read More &raquo;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/\" \/>\n<meta property=\"og:site_name\" content=\"softwareab\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cloudraticsolutions\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/cloudraticsolutions\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-16T14:16:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-05-01T18:48:48+00:00\" \/>\n<meta name=\"author\" content=\"Andrew Bruce\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@realcloudratics\" \/>\n<meta name=\"twitter:site\" content=\"@realcloudratics\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Bruce\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/\"},\"author\":{\"name\":\"Andrew Bruce\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\"},\"headline\":\"Whitepaper 03-03: Three Risk Management Methodologies\",\"datePublished\":\"2013-04-16T14:16:23+00:00\",\"dateModified\":\"2013-05-01T18:48:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/\"},\"wordCount\":148,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\"},\"keywords\":[\"dod\",\"ia\",\"policy\"],\"articleSection\":[\"Teknophobia\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/\",\"url\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/\",\"name\":\"Whitepaper 03-03: Three Risk Management Methodologies - softwareab\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#website\"},\"datePublished\":\"2013-04-16T14:16:23+00:00\",\"dateModified\":\"2013-05-01T18:48:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareab.net\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"dod\",\"item\":\"https:\/\/www.softwareab.net\/wordpress\/tag\/dod\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Whitepaper 03-03: Three Risk Management Methodologies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#website\",\"url\":\"https:\/\/www.softwareab.net\/wordpress\/\",\"name\":\"softwareab\",\"description\":\"Technocratica, Technopolitik, Technophobia\",\"publisher\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareab.net\/wordpress\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\",\"name\":\"Andrew Bruce\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg\",\"contentUrl\":\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg\",\"width\":400,\"height\":330,\"caption\":\"Andrew Bruce\"},\"logo\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/\"},\"description\":\"Team-oriented systems mentor with deep knowledge of numerous software methodologies, technologies, languages, and operating systems. Excited about turning emerging technology into working production-ready systems. Focused on moving software teams to a higher level of world-class application development. Specialties:Software analysis and development...Product management through the entire lifecycle...Discrete product integration specialist!\",\"sameAs\":[\"http:\/\/cloudraticsolutions.net\/\",\"https:\/\/www.facebook.com\/cloudraticsolutions\/\",\"https:\/\/twitter.com\/realcloudratics\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whitepaper 03-03: Three Risk Management Methodologies - softwareab","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/","og_locale":"en_US","og_type":"article","og_title":"Whitepaper 03-03: Three Risk Management Methodologies - softwareab","og_description":"Click here to download &#8220;Risk Management Methodologies&#8221; now! Companies thrive based on the results of their business decisions: from headliners (invest in cloud computing or\u00c2\u00a0upgrade servers?); to managerial (add resources to an executing project?); to operational (is it time to &hellip; Whitepaper 03-03: Three Risk Management Methodologies Read More &raquo;","og_url":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/","og_site_name":"softwareab","article_publisher":"https:\/\/www.facebook.com\/cloudraticsolutions\/","article_author":"https:\/\/www.facebook.com\/cloudraticsolutions\/","article_published_time":"2013-04-16T14:16:23+00:00","article_modified_time":"2013-05-01T18:48:48+00:00","author":"Andrew Bruce","twitter_card":"summary_large_image","twitter_creator":"@realcloudratics","twitter_site":"@realcloudratics","twitter_misc":{"Written by":"Andrew Bruce","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/#article","isPartOf":{"@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/"},"author":{"name":"Andrew Bruce","@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600"},"headline":"Whitepaper 03-03: Three Risk Management Methodologies","datePublished":"2013-04-16T14:16:23+00:00","dateModified":"2013-05-01T18:48:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/"},"wordCount":148,"commentCount":0,"publisher":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600"},"keywords":["dod","ia","policy"],"articleSection":["Teknophobia"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/","url":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/","name":"Whitepaper 03-03: Three Risk Management Methodologies - softwareab","isPartOf":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#website"},"datePublished":"2013-04-16T14:16:23+00:00","dateModified":"2013-05-01T18:48:48+00:00","breadcrumb":{"@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-03-03-three-risk-management-methodologies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareab.net\/wordpress\/"},{"@type":"ListItem","position":2,"name":"dod","item":"https:\/\/www.softwareab.net\/wordpress\/tag\/dod\/"},{"@type":"ListItem","position":3,"name":"Whitepaper 03-03: Three Risk Management Methodologies"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareab.net\/wordpress\/#website","url":"https:\/\/www.softwareab.net\/wordpress\/","name":"softwareab","description":"Technocratica, Technopolitik, Technophobia","publisher":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareab.net\/wordpress\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600","name":"Andrew Bruce","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg","contentUrl":"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg","width":400,"height":330,"caption":"Andrew Bruce"},"logo":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/"},"description":"Team-oriented systems mentor with deep knowledge of numerous software methodologies, technologies, languages, and operating systems. Excited about turning emerging technology into working production-ready systems. Focused on moving software teams to a higher level of world-class application development. Specialties:Software analysis and development...Product management through the entire lifecycle...Discrete product integration specialist!","sameAs":["http:\/\/cloudraticsolutions.net\/","https:\/\/www.facebook.com\/cloudraticsolutions\/","https:\/\/twitter.com\/realcloudratics"]}]}},"_links":{"self":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts\/111"}],"collection":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/comments?post=111"}],"version-history":[{"count":3,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts\/111\/revisions"}],"predecessor-version":[{"id":214,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts\/111\/revisions\/214"}],"wp:attachment":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/media?parent=111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/categories?post=111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/tags?post=111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}