Remove Asset Management Remove Audit Remove Authorization Remove Vulnerability
article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

For example, a forensic finding made during an evaluation of Colonial Pipeline noted numerous known and preventable vulnerabilities, such as unpatched and outdated systems, that likely led to the security breach. Asset Management. About the Author: Steven Minksy. Risk Assessments & User Access Reviews.

article thumbnail

Adversarial Risk Management

FS-ISAC

You can hire a professional audit firm to benchmark the bucket against peer buckets. We chase concepts that seem simple, such as "basic" network hygiene, asset management, and patching. But these approaches rely on tenets based on traditional operational and financial risk management. Or you could fill it with water.