{"id":2209,"date":"2022-02-12T01:00:00","date_gmt":"2022-02-12T01:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2017\/03\/31\/cybersecurity-risk-management-finding-and-fixing-your-security-vulnerabilities\/"},"modified":"2022-08-18T20:11:15","modified_gmt":"2022-08-18T20:11:15","slug":"cybersecurity-risk-management","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/","title":{"rendered":"What is Cybersecurity Risk Management?"},"content":{"rendered":"\n<p>Risk management is a concept that has been around as long as companies have had assets to protect. The simplest example may be insurance. Life, health, auto, and other insurance are all designed to help a person protect against losses.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/risk-management-software\/\">Risk management<\/a> also extends to physical devices, such as doors and locks to protect homes and vehicles, vaults to safeguard money and precious jewels, and police, fire, and CCTV to protect against other physical risks.<\/p>\n\n\n\n<p>As data and IT infrastructure become more valuable by the day, <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-cybersecurity-companies\/\">cybersecurity<\/a> risk management is increasingly important for enterprises with a steep cost for noncompliance or extensive, unaddressed <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">vulnerabilities<\/a>. This article looks at cybersecurity risk management, establishing a risk management system, and best practices for building resilience.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6e3de3aa7e\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6e3de3aa7e\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#What-is-Cybersecurity-Risk-Management\" title=\"What is Cybersecurity Risk Management?\">What is Cybersecurity Risk Management?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#Setting-Up-Your-Risk-Management-System\" title=\"Setting Up Your Risk Management System\">Setting Up Your Risk Management System<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#Risk-Management-Process\" title=\"Risk Management Process\">Risk Management Process<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#Risk-Mitigation-Steps\" title=\"Risk Mitigation Steps\">Risk Mitigation Steps<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#Enhancing-Cyber-Risk-Management\" title=\"Enhancing Cyber Risk Management\">Enhancing Cyber Risk Management<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#The-Human-Element\" title=\"The Human Element\">The Human Element<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#Incident-Response\" title=\"Incident Response\">Incident Response<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#Cybersecurity-Solutions-and-Risk-Management-Services\" title=\"Cybersecurity Solutions and Risk Management Services\">Cybersecurity Solutions and Risk Management Services<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#Ongoing-Development-and-Progress\" title=\"Ongoing Development and Progress\">Ongoing Development and Progress<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What-is-Cybersecurity-Risk-Management\"><\/span><strong>What is Cybersecurity Risk Management?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Cybersecurity <a href=\"https:\/\/www.esecurityplanet.com\/threats\/attacks-escalating-against-linux-based-iot-devices\/\">attacks<\/a> can compromise systems, steal data and other valuable company information, and damage an enterprise&#8217;s reputation. As the volume and severity of cyber attacks grow, the need for cybersecurity risk management grows with it. IT departments rely on a combination of strategies, technologies, and user awareness training to protect an enterprise organization.<\/p>\n\n\n\n<p>Cybersecurity risk management takes the idea of traditional risk management and applies it to digital systems and infrastructure. It involves identifying your risks and vulnerabilities and using administrative actions and comprehensive solutions to ensure your organization is adequately protected.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Read more: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\"><strong>Best Third-Party Risk Management Tools of 2022<\/strong><\/a><\/h5>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Setting-Up-Your-Risk-Management-System\"><\/span><strong>Setting Up Your Risk Management System<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What IT Assets Need Protection?<\/strong><\/h3>\n\n\n\n<p>Before setting up a cybersecurity risk management system, the enterprise must determine what <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-it-asset-management-tools-for-security\/\">assets<\/a> it needs to protect and prioritize. As the National Institute of Standards and Technology (NIST) points out in its Framework for Improving Critical Infrastructure Cybersecurity, <strong>there is no one-size-fits-all solution<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Maintaining Regulatory Compliance<\/strong><\/h3>\n\n\n\n<p>Different organizations have different technology infrastructures and different potential risks. Some organizations, such as financial services firms and healthcare organizations, have <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/\">regulatory<\/a> concerns in addition to business concerns that need addressing in a cybersecurity risk management system. Cybersecurity should follow a layered approach, with additional protections for the most critical assets, such as corporate and customer data. Remember that reputational harm from a breach can damage more than the breach itself.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Documenting and Implementing Procedures<\/strong><\/h3>\n\n\n\n<p>Citrix recommends that organizations have fully documented and implemented all activities that may create cybersecurity risks. Corporate cybersecurity programs must employ industry-leading practices in line with ISO 270001\/2. Typical programs include hardware and software implementations with change management oversight and non-production testing and evaluation.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Also read<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/products\/grc-tools\/\">Top Governance, Risk, and Compliance (GRC) Tools<\/a><\/h5>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Risk-Management-Process\"><\/span><strong>Risk Management Process<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Start with a cybersecurity framework developed from each area of the business to determine the company&#8217;s desired risk posture.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Mapping Environment Data<\/strong><\/h3>\n\n\n\n<p>Guidance Software recommends using new technologies to find and map data across the enterprise. Once data gets mapped, organizations can make decisions on how to govern specific data or systems and reduce their risk footprint.<\/p>\n\n\n\n<p>For example, even with training and strong security culture, sensitive information can leave an organization simply by accident, such as data stored in hidden rows in spreadsheets or included in notes within employee presentations or long email threads. Scanning the enterprise for sensitive data at rest and then removing any data stored where it does not belong dramatically reduces the risk of an accidental loss of sensitive data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Applying the Capability Maturity Model and&nbsp;<\/strong><\/h3>\n\n\n\n<p>Deloitte recommends that the risk management process follow the Capability Maturity Model (CMM) approach, with the following five levels:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Initial<\/strong>: the starting point for the use of a new or undocumented repeat process<\/li><li><strong>Repeatable:<\/strong> process documented sufficiently for repeat attempts<\/li><li><strong>Defined<\/strong>: the function is defined and confirmed as a standard business process<\/li><li><strong>Managed<\/strong>: the process uses quantitative and agreed-upon metrics<\/li><li><strong>Optimizing<\/strong>: process management includes deliberate process improvement<\/li><\/ol>\n\n\n\n<p>Clients can use their findings to determine a baseline for their current risk posture and what the enterprise needs to do to move from the current state to the desired state of risk exposure. As long as proactive steps get taken to understand potential risks, there will be less likelihood of risk exposure and falling victim to a cybersecurity incident.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Read more: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/database-security-tools\/\"><strong>Top Database Security Solutions for 2022<\/strong><\/a><\/h5>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Risk-Reward Calculation<\/strong><\/h3>\n\n\n\n<p>Deloitte also recommends doing a risk-reward calculation and prioritizing network security enhancements that will provide the most significant improvements at the lowest cost. Some enterprises may be comfortable with 99 percent of all security upgrades. Others will want to be closer to 100 percent, particularly in regulated industries.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>A Mature Risk Management System Takes Time<\/strong><\/h3>\n\n\n\n<p>There should be incremental steps and goals (i.e., 5 percent improvement within six months) that are measurable to determine if the enterprise is progressing toward its planned cybersecurity risk posture. However, even minor security vulnerabilities can lead to significant losses if <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-security-tools\/\">network systems<\/a> are vulnerable to intrusion from an unimportant area, where unauthorized entry can lead to more critical and sensitive systems and data.The only way to make a system 100 percent secure is to ensure it isn&#8217;t accessible by anyone, which is impractical at best. The more locked down a system is, the harder it may be for authorized personnel to conduct business. If <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/oauth\/\">authorized<\/a> users cannot access the systems or data they need to perform their jobs, they may look for workarounds that could compromise systems.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/04\/ESP.RMCycle-1014x1024.png\" alt=\"An infographic showing the five stages of the risk management cycle\" class=\"wp-image-19878\" width=\"578\" height=\"584\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/ESP.RMCycle-1014x1024.png 1014w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/ESP.RMCycle-297x300.png 297w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/ESP.RMCycle-768x775.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/ESP.RMCycle-1522x1536.png 1522w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/ESP.RMCycle-2029x2048.png 2029w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/ESP.RMCycle-150x151.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/ESP.RMCycle-300x303.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/ESP.RMCycle-696x703.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/ESP.RMCycle-1068x1078.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/ESP.RMCycle-1920x1938.png 1920w\" sizes=\"(max-width: 578px) 100vw, 578px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Risk-Mitigation-Steps\"><\/span><strong>Risk Mitigation Steps<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Among the cybersecurity precautions to consider:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Limiting devices with Internet access<\/li><li>Installing <a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\">Network Access Control<\/a> (NAC)<\/li><li>Restricting access to admin credentials and the control rights for each administrator<\/li><li>Automated <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">patches<\/a> for operating systems<\/li><li>Limits for older operating systems (i.e., Windows XL or older; OS no longer supported)<\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">Firewalls<\/a> to monitor and block malicious traffic<\/li><li><a href=\"https:\/\/www.founderjar.com\/best-antivirus-software\/\">Anti-virus<\/a> programs and <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/\">endpoint security<\/a><\/li><li>Requiring t<a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">wo-factor authentication<\/a> to gain access to specific files and systems<\/li><li>Evaluating the <a href=\"https:\/\/www.esecurityplanet.com\/products\/grc-tools\/\">governance<\/a> structure to ensure checks and balances<\/li><li>Limiting administrative privileges<\/li><\/ul>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Also read: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/\"><strong>Thousands of Data Center Management Apps Exposed to Internet<\/strong><\/a><\/h5>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Enhancing-Cyber-Risk-Management\"><\/span><strong>Enhancing Cyber Risk Management<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Advanced Encryption<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\">Encryption<\/a> is not a new feature in databases, but today&#8217;s encryption capabilities require more to protect data from cybercriminals and insider threats. These features include granular role-based access, standards-based <a href=\"https:\/\/www.esecurityplanet.com\/networks\/encryption\/\">cryptography<\/a>, advanced key management, granular separation of duties, and state-of-art algorithms that drastically decrease exposure.<\/p>\n\n\n\n<p>Though data encryption is helpful against outside breaches, it does little to protect against internal data theft. Insiders with access to sensitive data will necessarily have the credentials to <a href=\"https:\/\/www.esecurityplanet.com\/networks\/the-case-for-decryption-in-cybersecurity\/\">decrypt<\/a> it. Companies must also guard against data removed from enterprise systems through removable media such as thumb drives and other means (see <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-full-disk-software-products\/\">Top Full Disk Encryption Solutions of 2022<\/a>).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Redaction<\/strong><\/h3>\n\n\n\n<p>Companies need to balance data protection with the ability to share it. Redaction enables companies to share information with minimal effort by concealing sensitive information, like names and social security numbers, from queries and updates.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Element-Level Security<\/strong><\/h3>\n\n\n\n<p>While redaction is essential, companies need to do it based on an employee&#8217;s role at the element or property level. Companies also need to be able to implement custom and out-of-the-box rules.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Read more: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/mssp-tools-services\/\"><strong>Becoming an MSSP: Tools, Services &amp; Tops for Managed Security Services<\/strong><\/a><\/h5>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The-Human-Element\"><\/span><strong>The Human Element<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Beyond the technology precautions themselves, ongoing training and education about security threats are essential. Many hackers have moved beyond Trojans, viruses, and other <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> to <a href=\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/\">phishing<\/a> and spear-phishing, targeting those with administrative rights and individuals to access executable files containing malware or provide credentials or sensitive personal or corporate data.<\/p>\n\n\n\n<p>NIST recommends including cybersecurity information in company policies for company employees and business partners to know what is and what isn&#8217;t acceptable.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Incident-Response\"><\/span><strong>Incident Response<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Just being on the Internet exposes an enterprise to cybersecurity risk. External and internal attempts to compromise an organization&#8217;s data occur regularly. So <a href=\"https:\/\/www.esecurityplanet.com\/networks\/best-incident-response-tools-services\/\">incident response<\/a> plans should be in place to determine what actions to take if specific security incidents arise. Increasing hacker attempts at the enterprise or in the company&#8217;s industry mean heightened precautions would be wise.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Need for Incident Response Plan<\/strong><\/h3>\n\n\n\n<p>If an actual breach occurs, the enterprise should have detailed plans to notify inside and outside the company, contact information for law enforcement, business suppliers, and customers, an action item checklist, public relations response, etc. <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-61r2.pdf\">NIST<\/a> offers a comprehensive incident response action plan.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Also read: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/digital-forensics-software\/\"><strong>Best Digital Forensics Tools &amp; Software of 2022<\/strong><\/a><\/h5>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cybersecurity-Solutions-and-Risk-Management-Services\"><\/span><strong>Cybersecurity Solutions and Risk Management Services<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Ideally, an organization will develop a comprehensive security posture that includes a combination of technologies such as firewalls, endpoint protection, <a href=\"https:\/\/www.esecurityplanet.com\/products\/intrusion-detection-and-prevention-systems\/\">intrusion prevention<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\">threat intelligence<\/a>, and access controls. To get there, organizations might want to consider risk management services for a comprehensive assessment and solution recommendations to maximize their security budget.<\/p>\n\n\n\n<p>Several firms offer comprehensive risk management services. Among them:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Deloitte<\/li><li>E&amp;Y<\/li><li>Booz Allen Hamilton<\/li><li>Hewlett Packard Enterprise<\/li><li>KPMG<\/li><li>PwC<\/li><li>Symantec<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ongoing-Development-and-Progress\"><\/span><strong>Ongoing Development and Progress<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Cybersecurity risk management is an ongoing process, something the NIST Framework recognizes in calling itself &#8220;a living document&#8221; intended to be revised and updated as needed.&nbsp;<\/p>\n\n\n\n<p>Once an enterprise conducts its original <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-conduct-a-vulnerability-assessment-steps-toward-better-cybersecurity\/\">risk assessment<\/a> and advances from the current to the desired risk posture, regular, periodic inspections are essential to look for new vulnerabilities and threats and address findings to maintain its risk posture at the desired level continually.<\/p>\n\n\n\n<p><em>This article was originally written by <a href=\"https:\/\/www.esecurityplanet.com\/author\/phil-britt\/\" target=\"_blank\" rel=\"noreferrer noopener\">Phil Britt<\/a><\/em> and<em> published on March 31, 2017, and updated by <a href=\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\">Sam Ingalls<\/a> on February 13, 2022.<\/em><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Read more: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/\"><strong>Automating Security Risk Assessments for Better Protection<\/strong><\/a><\/h5>\n\n\n<div id=\"ta-campaign-widget-66d6e3de37e2b-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6e3de37e2b\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6e3de37e2b\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6e3de37e2b\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6e3de37e2b\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6e3de37e2b\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6e3de37e2b\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Risk management is a concept that has been around as long as companies have had assets to protect. The simplest example may be insurance. Life, health, auto, and other insurance are all designed to help a person protect against losses.&nbsp; Risk management also extends to physical devices, such as doors and locks to protect homes [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":20924,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[9651],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[382,386,375],"class_list":["post-2209","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-faq","b2b_audience-evaluation-and-selection","b2b_product-application-security-vulnerability-management","b2b_product-consulting-services","b2b_product-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Cybersecurity Risk Management? | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Cybersecurity risk management helps identify your biggest security vulnerabilities and apply the solutions that will keep you protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Cybersecurity Risk Management? | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity risk management helps identify your biggest security vulnerabilities and apply the solutions that will keep you protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-12T01:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-18T20:11:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/03\/ESP.CybersecurityRiskManagement-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1109\" \/>\n\t<meta property=\"og:image:height\" content=\"1010\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sam Ingalls\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/SamIngalls\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Ingalls\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/\"},\"author\":{\"name\":\"Sam Ingalls\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\"},\"headline\":\"What is Cybersecurity Risk Management?\",\"datePublished\":\"2022-02-12T01:00:00+00:00\",\"dateModified\":\"2022-08-18T20:11:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/\"},\"wordCount\":1538,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/03\/ESP.CybersecurityRiskManagement-1.jpeg\",\"keywords\":[\"FAQ\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/\",\"name\":\"What is Cybersecurity Risk Management? | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/03\/ESP.CybersecurityRiskManagement-1.jpeg\",\"datePublished\":\"2022-02-12T01:00:00+00:00\",\"dateModified\":\"2022-08-18T20:11:15+00:00\",\"description\":\"Cybersecurity risk management helps identify your biggest security vulnerabilities and apply the solutions that will keep you protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/03\/ESP.CybersecurityRiskManagement-1.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/03\/ESP.CybersecurityRiskManagement-1.jpeg\",\"width\":1109,\"height\":1010,\"caption\":\"A picture of a dark forest with a warning sign in front of it because this article is about cybersecurity risk management.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Cybersecurity Risk Management?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\",\"name\":\"Sam Ingalls\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"caption\":\"Sam Ingalls\"},\"description\":\"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/singalls\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls\"],\"url\":\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Cybersecurity Risk Management? | eSecurity Planet","description":"Cybersecurity risk management helps identify your biggest security vulnerabilities and apply the solutions that will keep you protected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/","og_locale":"en_US","og_type":"article","og_title":"What is Cybersecurity Risk Management? | eSecurity Planet","og_description":"Cybersecurity risk management helps identify your biggest security vulnerabilities and apply the solutions that will keep you protected.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/","og_site_name":"eSecurity Planet","article_published_time":"2022-02-12T01:00:00+00:00","article_modified_time":"2022-08-18T20:11:15+00:00","og_image":[{"width":1109,"height":1010,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/03\/ESP.CybersecurityRiskManagement-1.jpeg","type":"image\/jpeg"}],"author":"Sam Ingalls","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/SamIngalls","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sam Ingalls","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/"},"author":{"name":"Sam Ingalls","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2"},"headline":"What is Cybersecurity Risk Management?","datePublished":"2022-02-12T01:00:00+00:00","dateModified":"2022-08-18T20:11:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/"},"wordCount":1538,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/03\/ESP.CybersecurityRiskManagement-1.jpeg","keywords":["FAQ"],"articleSection":["Networks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/","url":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/","name":"What is Cybersecurity Risk Management? | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/03\/ESP.CybersecurityRiskManagement-1.jpeg","datePublished":"2022-02-12T01:00:00+00:00","dateModified":"2022-08-18T20:11:15+00:00","description":"Cybersecurity risk management helps identify your biggest security vulnerabilities and apply the solutions that will keep you protected.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/03\/ESP.CybersecurityRiskManagement-1.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/03\/ESP.CybersecurityRiskManagement-1.jpeg","width":1109,"height":1010,"caption":"A picture of a dark forest with a warning sign in front of it because this article is about cybersecurity risk management."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"What is Cybersecurity Risk Management?"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2","name":"Sam Ingalls","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","caption":"Sam Ingalls"},"description":"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.","sameAs":["https:\/\/www.linkedin.com\/in\/singalls\/","https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls"],"url":"https:\/\/www.esecurityplanet.com\/author\/singalls\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/2209"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=2209"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/2209\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20924"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=2209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=2209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=2209"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=2209"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=2209"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=2209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}