{"id":18034,"date":"2021-01-12T15:38:52","date_gmt":"2021-01-12T15:38:52","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18034"},"modified":"2021-06-18T18:51:08","modified_gmt":"2021-06-18T18:51:08","slug":"automated-security-risk-assessments","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/","title":{"rendered":"Automating Security Risk Assessments for Better Protection"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest challenges today\u2019s global businesses face. As a savvy tech leader, you are likely hyperfocused on performing security risk audits to keep your networks strong and protected. Automated <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/\"><span style=\"font-weight: 400;\">security risk assessments<\/span><\/a><span style=\"font-weight: 400;\"> can be a good way to take your cybersecurity defenses to the next level and make your organization more efficient at the same time.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Components of Security Risk Assessments<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Security risk assessments are one of the best measures your organization can take to protect the organization from cyber threats. As technology and business change, threats evolve and the internal or external landscape of your business fluctuates, so these routine audits play a pivotal role in keeping danger at bay. Your security risk assessment will most likely be aimed at measuring the security strength or weakness of the organization as well as checking in on <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\"><span style=\"font-weight: 400;\">compliance requirements<\/span><\/a><span style=\"font-weight: 400;\"> and industry frameworks. Your security assessment should include audits of things like:<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\"><span style=\"font-weight: 400;\">Access<\/span><\/a><span style=\"font-weight: 400;\"> to systems and data<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Open ports and other <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/\"><span style=\"font-weight: 400;\">vulnerabilities<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/antivirus-vs-epp-vs-edr\/\"><span style=\"font-weight: 400;\">Endpoint protection<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Password protocols<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\"><span style=\"font-weight: 400;\">Patch management<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\"><span style=\"font-weight: 400;\">Encryption<\/span><\/a><span style=\"font-weight: 400;\"> strength<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/\"><span style=\"font-weight: 400;\">Mobile devices<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">IT policies and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\"><span style=\"font-weight: 400;\">training<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data backups<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cybersecurity preparedness\/<\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/cyber-insurance-companies\/\"><span style=\"font-weight: 400;\">insurance<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Internal\/external scans<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">With security risk assessments, the cybersecurity professionals within an organization can clearly see the efficiency of the organization\u2019s controls, determine risk factors, come up with detailed plans and solutions, detect vulnerabilities and offer options to alleviate them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are a few core components of cyber risk assessments:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing\/\"><b>Penetration testing<\/b><\/a><span style=\"font-weight: 400;\">: This type of security risk assessment, also referred to as \u201cpenetration testing,\u201d is aimed at simulating what a cyber attacker can see and how your system\u2019s security measures will stand up to the test.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Risk assessment<\/b><span style=\"font-weight: 400;\">: A risk assessment quantifies what you have to lose (i.e., what information assets could be impacted by a possible cyber attack, including hardware, systems, laptops, customer data and intellectual property), and then assesses the risks of losing control of these assets during a cyber event.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-conduct-a-vulnerability-assessment-steps-toward-better-cybersecurity\/\"><b>Vulnerability assessment<\/b><\/a><span style=\"font-weight: 400;\">: Vulnerability assessments outline the known places where your system is vulnerable. The goal is to continue to monitor, prioritize and close gaps where possible in these areas.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Compliance assessment<\/b><span style=\"font-weight: 400;\">: A compliance assessment checks to see if your security and data controls meet regulations like <\/span><a href=\"https:\/\/www.esecurityplanet.com\/compliance\/one-year-into-gdpr-whats-changed\/\"><span style=\"font-weight: 400;\">GDPR<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.esecurityplanet.com\/compliance\/ccpa-compliance\/\"><span style=\"font-weight: 400;\">CCPA<\/span><\/a><span style=\"font-weight: 400;\">, HIPAA and PCI-DSS. Failure to meet appropriate compliance and data privacy rules can cause more than cyber risks.\u00a0 It can lead to fines, legal challenges and all manner of trouble.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Manual risk assessments can be risky<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Like most areas of technology, manual workflows are more than just inefficient. Staff turnover, demanding workloads, human error and subjectivity can cause the manual process to fail. Not to mention that when a tech team is freed up from executing on manual tasks, they are available to work on meaningful projects that support the overarching goals of the business.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There is no sweeping, one-size-fits-all protocol for manual vs. automated security risk assessments. Some tests may just have to be run manually because your systems may not allow completely automated assessments. Manual assessment can work in tandem with your automated security risk assessment to ensure all bases are covered.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What automated security risk assessment looks like today<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Assessing cybersecurity risk on a routine basis is one of the most important roles you can play as a tech leader in your organization. For a robust cybersecurity assessment program, it\u2019s imperative to automate as much as possible. Your automated security risk assessment tool will ideally aggregate levels of security from a myriad of sources, provide a dashboard view of your security status and be set to sound an alert should something change.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Manual and automated security risk assessments bring differing elements to the table and may be the combination you need to keep your business safe from threat. By finding the perfect mix of manual vulnerability scanning along with cutting-edge automated tools, technology departments no longer have to settle for only one option. It&#8217;s possible to find all the protection you need from a couple of sources that perform different yet complementary duties.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Automated security risk assessment tools<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">There are a number of tools that can play a role in automated security risk assessments. <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\"><span style=\"font-weight: 400;\">Vulnerability management<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/governance-risk-and-compliance-grc-vendors\/\"><span style=\"font-weight: 400;\">GRC<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/breach-and-attack-simulation-bas-vendors\/\"><span style=\"font-weight: 400;\">breach and attack simulation<\/span><\/a><span style=\"font-weight: 400;\"> are a few such tools.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are also comprehensive tools that can do the work for you, like RSA&#8217;s Archer suite, and IBM, MetricStream, ServiceNow, NAVEX Lockpath and SAI are other integrated risk management leaders, according to Gartner.<\/span><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6ed18c60e7-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ed18c60e7\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ed18c60e7\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ed18c60e7\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ed18c60e7\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ed18c60e7\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ed18c60e7\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest challenges today\u2019s global businesses face. As a savvy tech leader, you are likely hyperfocused on performing security risk audits to keep your networks strong and protected. Automated security risk assessments can [&hellip;]<\/p>\n","protected":false},"author":247,"featured_media":18035,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[3790],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[382,375],"class_list":["post-18034","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cybersecurity","b2b_audience-awareness-and-consideration","b2b_product-application-security-vulnerability-management","b2b_product-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Automating Security Risk Assessments for Better Protection<\/title>\n<meta name=\"description\" content=\"Ongoing information security risk assessments are important for staying on top of threats and vulnerabilities. Automating them is even better.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Automating Security Risk Assessments for Better Protection\" \/>\n<meta property=\"og:description\" content=\"Ongoing information security risk assessments are important for staying on top of threats and vulnerabilities. Automating them is even better.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-12T15:38:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-18T18:51:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/01\/security-gui.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jen Seitz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jen Seitz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/\"},\"author\":{\"name\":\"Jen Seitz\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/30913dd1a86df2bcdbff12ab43c3c4ed\"},\"headline\":\"Automating Security Risk Assessments for Better Protection\",\"datePublished\":\"2021-01-12T15:38:52+00:00\",\"dateModified\":\"2021-06-18T18:51:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/\"},\"wordCount\":761,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/01\/security-gui.jpg\",\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/\",\"name\":\"Automating Security Risk Assessments for Better Protection\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/01\/security-gui.jpg\",\"datePublished\":\"2021-01-12T15:38:52+00:00\",\"dateModified\":\"2021-06-18T18:51:08+00:00\",\"description\":\"Ongoing information security risk assessments are important for staying on top of threats and vulnerabilities. Automating them is even better.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/01\/security-gui.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/01\/security-gui.jpg\",\"width\":1200,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Automating Security Risk Assessments for Better Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/30913dd1a86df2bcdbff12ab43c3c4ed\",\"name\":\"Jen Seitz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5b085a444e5b37e5def5c2ce54d37aa3?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5b085a444e5b37e5def5c2ce54d37aa3?s=96&d=blank&r=g\",\"caption\":\"Jen Seitz\"},\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jseitz\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Automating Security Risk Assessments for Better Protection","description":"Ongoing information security risk assessments are important for staying on top of threats and vulnerabilities. Automating them is even better.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/","og_locale":"en_US","og_type":"article","og_title":"Automating Security Risk Assessments for Better Protection","og_description":"Ongoing information security risk assessments are important for staying on top of threats and vulnerabilities. Automating them is even better.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/","og_site_name":"eSecurity Planet","article_published_time":"2021-01-12T15:38:52+00:00","article_modified_time":"2021-06-18T18:51:08+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/01\/security-gui.jpg","type":"image\/jpeg"}],"author":"Jen Seitz","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jen Seitz","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/"},"author":{"name":"Jen Seitz","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/30913dd1a86df2bcdbff12ab43c3c4ed"},"headline":"Automating Security Risk Assessments for Better Protection","datePublished":"2021-01-12T15:38:52+00:00","dateModified":"2021-06-18T18:51:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/"},"wordCount":761,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/01\/security-gui.jpg","keywords":["cybersecurity"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/","url":"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/","name":"Automating Security Risk Assessments for Better Protection","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/01\/security-gui.jpg","datePublished":"2021-01-12T15:38:52+00:00","dateModified":"2021-06-18T18:51:08+00:00","description":"Ongoing information security risk assessments are important for staying on top of threats and vulnerabilities. Automating them is even better.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/01\/security-gui.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/01\/security-gui.jpg","width":1200,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Automating Security Risk Assessments for Better Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/30913dd1a86df2bcdbff12ab43c3c4ed","name":"Jen Seitz","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5b085a444e5b37e5def5c2ce54d37aa3?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5b085a444e5b37e5def5c2ce54d37aa3?s=96&d=blank&r=g","caption":"Jen Seitz"},"url":"https:\/\/www.esecurityplanet.com\/author\/jseitz\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18034"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/247"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18034"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18034\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18035"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18034"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18034"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18034"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}