Risk assessments for the real world: Tools even I can use


Tom Bowers, Technical Editor of

Information Security magazine, presented this session at Information Security

    Requires Free Membership to View

Decisions Fall 2005.


View our resource center for more tips and expert advice on risk assessments

View more presentations from some of the industry's foremost security practitioners

Learn more about Information Security Decisions

Wouldn't it be nice if security divisions within the enterprise were flush with capital and could invest the appropriate time and money to do a thorough risk assessment? After all, only by analyzing threats and vulnerabilities and quantifying potential losses can a company understand the countermeasures it needs in place. In the real world, security groups struggle to provide executives with business justifications that demonstrate what they are bringing to the table. Fortunately, a number of inexpensive and free risk assessment packages are available that attach real numbers to vulnerabilities. This presentation provides an overview of those tools and helps you take your risk assessment program to the next level.


  • An understanding of the real value in risk assessment
  • Details on tools that won't break the budget
  • An overview of the commercial tool landscape
  • Information on how to use these tools effectively
  • Insight into the best way to deliver risk assessment results to management

Download this presentation

This was first published in January 2008

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.