{"id":8575,"date":"2024-01-25T18:19:40","date_gmt":"2024-01-25T18:19:40","guid":{"rendered":"https:\/\/www.satup.xyz\/index.php\/2024\/01\/25\/building-an-agile-security-risk-management-program-by-renae-kang-jan-2024\/"},"modified":"2024-01-25T18:19:40","modified_gmt":"2024-01-25T18:19:40","slug":"building-an-agile-security-risk-management-program-by-renae-kang-jan-2024","status":"publish","type":"post","link":"https:\/\/www.satup.xyz\/index.php\/2024\/01\/25\/building-an-agile-security-risk-management-program-by-renae-kang-jan-2024\/","title":{"rendered":"Building an Agile Security Risk Management Program | by Renae Kang | Jan, 2024"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div>\n<div>\n<h2 id=\"112d\" class=\"pw-subtitle-paragraph ho gq gr be b hp hq hr hs ht hu hv hw hx hy hz ia ib ic id cp dt\">By <a class=\"af ie\" href=\"https:\/\/www.linkedin.com\/in\/mattdcarroll\/\" rel=\"noopener ugc nofollow\" target=\"_blank\">Matt Carroll<\/a>, Senior Manager, Technology Governance, Risk, &amp; Compliance<\/h2>\n<div class=\"if ig ih ii ij\">\n<div class=\"speechify-ignore ab co\">\n<div class=\"speechify-ignore bg l\">\n<div class=\"ik il im in io ab\">\n<div>\n<div class=\"ab ip\"><a href=\"https:\/\/medium.com\/@renaekang97?source=post_page-----b18dd28143be--------------------------------\" rel=\"noopener follow\"><\/p>\n<div>\n<div class=\"bl\" aria-hidden=\"false\">\n<div class=\"l iq ir bx is it\">\n<div class=\"l fg\"><img loading=\"lazy\" decoding=\"async\" alt=\"Renae Kang\" class=\"l fa bx dc dd cw\" src=\"https:\/\/miro.medium.com\/v2\/resize:fill:88:88\/1*_2c2rNBYDHH7262294wRcA.jpeg\" width=\"44\" height=\"44\" loading=\"lazy\" data-testid=\"authorPhoto\"\/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/a><a href=\"https:\/\/blog.developer.adobe.com\/?source=post_page-----b18dd28143be--------------------------------\" rel=\"noopener  ugc nofollow\"><\/p>\n<div class=\"iw ab fg\">\n<div>\n<div class=\"bl\" aria-hidden=\"false\">\n<div class=\"l ix iy bx is iz\">\n<div class=\"l fg\"><img loading=\"lazy\" decoding=\"async\" alt=\"Adobe Tech Blog\" class=\"l fa bx bq ja cw\" src=\"https:\/\/miro.medium.com\/v2\/resize:fill:48:48\/1*riyFijvwTfGcWNf1guRNtg.png\" width=\"24\" height=\"24\" loading=\"lazy\" data-testid=\"publicationPhoto\"\/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<figure class=\"nq nr ns nt nu nv nn no paragraph-image\">\n<div role=\"button\" tabindex=\"0\" class=\"nw nx fg ny bg nz\">\n<div class=\"nn no np\"><picture><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/format:webp\/1*Dhjv5bw2d9F7iEa6YR-3gQ.jpeg 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/format:webp\/1*Dhjv5bw2d9F7iEa6YR-3gQ.jpeg 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/format:webp\/1*Dhjv5bw2d9F7iEa6YR-3gQ.jpeg 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/format:webp\/1*Dhjv5bw2d9F7iEa6YR-3gQ.jpeg 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/format:webp\/1*Dhjv5bw2d9F7iEa6YR-3gQ.jpeg 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/format:webp\/1*Dhjv5bw2d9F7iEa6YR-3gQ.jpeg 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/format:webp\/1*Dhjv5bw2d9F7iEa6YR-3gQ.jpeg 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" type=\"image\/webp\"\/><source data-testid=\"og\" srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/1*Dhjv5bw2d9F7iEa6YR-3gQ.jpeg 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/1*Dhjv5bw2d9F7iEa6YR-3gQ.jpeg 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/1*Dhjv5bw2d9F7iEa6YR-3gQ.jpeg 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/1*Dhjv5bw2d9F7iEa6YR-3gQ.jpeg 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/1*Dhjv5bw2d9F7iEa6YR-3gQ.jpeg 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/1*Dhjv5bw2d9F7iEa6YR-3gQ.jpeg 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/1*Dhjv5bw2d9F7iEa6YR-3gQ.jpeg 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\"\/><img fetchpriority=\"high\" alt=\"\" class=\"bg mv oa c\" width=\"700\" height=\"467\" loading=\"eager\" role=\"presentation\"\/><\/picture><\/div>\n<\/div>\n<\/figure>\n<p id=\"d3fb\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">Getting dressed is a routine example of everyday life that is packed full of choices. <em class=\"ox\">Should I wear pants or shorts? Do I need a sweater? Shoes or sandals? <\/em>While we may make these choices subconsciously, I would argue that even actions that don\u2019t appear as choices include several microscopic risk-based calculations.<\/p>\n<p id=\"627c\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">We exercise similar judgments on behalf of the organizations that employ us. Each judgment we make corresponds to a level of risk and, in the cybersecurity industry, what is believed to be safe today may no longer be safe tomorrow (or possibly even within the hour). Given this unique challenge, how do you establish a process that allows you to identify, analyze, prioritize, and treat security risks that are constantly evolving and where the threat is persistently adapting?<\/p>\n<p id=\"34ac\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">The ability to clearly express and coordinate accumulated security risk within the organization allows us to focus on addressing the most critical organizational risks. In this blog, I will demonstrate the risk methodologies and best practices we\u2019ve developed at Adobe that have helped us rapidly measure security risk in a constantly changing security landscape.<\/p>\n<h2 id=\"484d\" class=\"oy oz gr be pa pb pc dx pd pe pf dz pg ok ph pi pj oo pk pl pm os pn po pp pq bj\"><strong class=\"al\">Defining the Scope of a Risk Program<\/strong><\/h2>\n<p id=\"5406\" class=\"pw-post-body-paragraph ob oc gr od b hp pr of og hs ps oi oj ok pt om on oo pu oq or os pv ou ov ow gk bj\">For the purposes of baselining the term \u201crisk,\u201d let\u2019s use the <a class=\"af ie\" href=\"https:\/\/csrc.nist.gov\/glossary\/term\/risk#:~:text=A%20measure%20of%20the%20extent,ii)%20the%20likelihood%20of%20occurrence.\" rel=\"noopener ugc nofollow\" target=\"_blank\">National Institute of Standards and Technology (NIST)<\/a> definition, which defines a risk as \u201ca<em class=\"ox\"> measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence.\u201d<\/em><\/p>\n<p id=\"ae75\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">The goal of an effective risk management program is to build an active function in which risks are identified, triaged in a consistent manner, and presented to leadership for action via risk-based decisions. However, a common pitfall to reaching this goal is maintaining a risk management program that ends up with hundreds \u2014 or even thousands \u2014 of tracked risks without any real action.<\/p>\n<p id=\"86ee\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">To understand this better, let\u2019s walk through an example:<\/p>\n<p id=\"8433\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">Let\u2019s say you perform a vulnerability scan against your environment and receive back a report of 500 identified vulnerabilities. Technically, each individual vulnerability represents a unique risk to the organization.<\/p>\n<p id=\"8b96\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">Rather than adding a list of vulnerabilities to the risk register, it\u2019s important to note that existing capabilities and processes in your security organization can be leveraged to mitigate those risks. For example, a well-established vulnerability management program may proactively address the risks associated with identified vulnerabilities by directly issuing tickets to offending teams for mitigation, thereby removing the need to add each individual vulnerability risk to your register.<\/p>\n<p id=\"7dbe\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">Given this understanding, Adobe primarily registers risks in our program under the following two (2) conditions:<\/p>\n<ol class=\"\">\n<li id=\"eb58\" class=\"ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow pw px py bj\">An identified issue where no process currently exists to address the issue (e.g., an issue is identified that is beyond the scope of the vulnerability management program) or,<\/li>\n<li id=\"6f7e\" class=\"ob oc gr od b hp pz of og hs qa oi oj ok qb om on oo qc oq or os qd ou ov ow pw px py bj\">An identified issue where the risk in a given process is high enough that it is no longer reasonably functioning (e.g., a team is not meeting their vulnerability SLAs)<\/li>\n<\/ol>\n<h2 id=\"090c\" class=\"oy oz gr be pa pb pc dx pd pe pf dz pg ok ph pi pj oo pk pl pm os pn po pp pq bj\">Performing a Risk Assessment<\/h2>\n<p id=\"a474\" class=\"pw-post-body-paragraph ob oc gr od b hp pr of og hs ps oi oj ok pt om on oo pu oq or os pv ou ov ow gk bj\">Once you start identifying and collecting risks in your register, the next step is to triage (or assess) the level of risk to the organization. The assessment\u2019s results will provide guidance on which risks to prioritize and treat first, versus risks that may pose a less severe threat and grant you some flexibility.<\/p>\n<p id=\"72cf\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">Two (2) industry standards prevail when it comes to performing risk assessments:<\/p>\n<ul class=\"\">\n<li id=\"b7a9\" class=\"ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow qe px py bj\"><strong class=\"od gs\">Qualitative<\/strong>: Non-numerical estimates of a given risk (i.e., Critical, High, Likely, Unlikely)<\/li>\n<li id=\"c530\" class=\"ob oc gr od b hp pz of og hs qa oi oj ok qb om on oo qc oq or os qd ou ov ow qe px py bj\"><strong class=\"od gs\">Quantitative<\/strong>: Numerical estimates of a given risk (e.g., 40% likelihood of occurrence resulting in the potential loss of $1M)<\/li>\n<\/ul>\n<p id=\"0f38\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">Our team uses both methods, with qualitative methods indicating speed, agility, and ease of understanding backed by quantitative data and numerical calculations determining the risk prioritization. This assessment process allows Adobe to remain agile and provide leadership the right information to make critical decisions. Organizations must evolve from point-in-time, compliance-driven, annual risk assessments to a continuous, real-time risk and threat evaluation.<\/p>\n<p id=\"d33f\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\"><strong class=\"od gs\"><em class=\"ox\">Rating Inherent Risks<\/em><\/strong><\/p>\n<p id=\"91ba\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">To demonstrate our agile approach to strategic risk management, let\u2019s use the following industry standard risk measurements:<\/p>\n<ul class=\"\">\n<li id=\"a66d\" class=\"ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow qe px py bj\"><strong class=\"od gs\">Inherent Risk<\/strong>: the likelihood and impact of a specific risk event occurring absent of security posture<\/li>\n<\/ul>\n<pre class=\"nq nr ns nt nu qf qg qh bo qi ba bj\"><span id=\"050d\" class=\"qj oz gr qg b bf qk ql l qm qn\">Inherent Risk = Likelihood x Impact<\/span><\/pre>\n<ul class=\"\">\n<li id=\"5966\" class=\"ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow qe px py bj\"><strong class=\"od gs\">Residual Risk<\/strong>: the remaining risk after taking action to alter the risk\u2019s likelihood or impact<\/li>\n<\/ul>\n<pre class=\"nq nr ns nt nu qf qg qh bo qi ba bj\"><span id=\"fc8c\" class=\"qj oz gr qg b bf qk ql l qm qn\">Residual Risk = Inherent Risk - Security Posture<\/span><\/pre>\n<p id=\"f3fe\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">Before starting a risk assessment, it is vital to ensure the risk itself is sufficiently documented in description and in detail \u2014 both technical and non-technical.<\/p>\n<p id=\"145b\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">To develop a system that can consistently evaluate information and rapidly determine the likelihood and impact of any risk, we formulated a listing of boolean (<em class=\"ox\">Yes\/No<\/em>) questions during the risk intake process.<\/p>\n<p id=\"91d1\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">Question Examples:<\/p>\n<ul class=\"\">\n<li id=\"f03d\" class=\"ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow qe px py bj\"><strong class=\"od gs\">Likelihood:<\/strong> Is the risk publicly exposed?<\/li>\n<li id=\"4d36\" class=\"ob oc gr od b hp pz of og hs qa oi oj ok qb om on oo qc oq or os qd ou ov ow qe px py bj\"><strong class=\"od gs\">Impact:<\/strong> If the risk is exploited, will there be internal [or external] consequences?<\/li>\n<\/ul>\n<p id=\"eb27\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">All risk ratings start at \u201cLow,\u201d or a score of 0, and increase as triage questions are answered with a \u201c<em class=\"ox\">Yes<\/em>\u201d response. The same set of questions are used to assess each ingested risk, allowing for rapid apples-to-apples comparison regardless of risk domain, category, or type. This uniform intake measurement process allows us to quickly identify the most significant inherent risks to our organization.<\/p>\n<p id=\"ba68\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\"><strong class=\"od gs\"><em class=\"ox\">Determining Security Posture &amp; Residual Risk<\/em><\/strong><\/p>\n<p id=\"d198\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">Once we\u2019ve determined inherent risk, we evaluate our security posture in relation to the risk. Security posture refers to an organization\u2019s overall cybersecurity strength and how well it can predict, prevent, and respond to security threats and risks.<\/p>\n<p id=\"2ab9\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">At Adobe, we utilize the <a class=\"af ie\" href=\"https:\/\/www.adobe.com\/trust\/compliance\/adobe-ccf.html\" rel=\"noopener ugc nofollow\" target=\"_blank\">Adobe Common Controls Framework (CCF)<\/a> as the foundation of our security posture. The CCF is applied across the enterprise to ensure a standard baseline of risk mitigation security controls are applied. In addition to our CCF controls, we also consider the following in relation to overall security posture:<\/p>\n<ul class=\"\">\n<li id=\"792e\" class=\"ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow qe px py bj\">Security policies, standards, or standard operating procedures<\/li>\n<li id=\"4d29\" class=\"ob oc gr od b hp pz of og hs qa oi oj ok qb om on oo qc oq or os qd ou ov ow qe px py bj\">Consistency, level of adoption, and effectiveness of security processes, tooling, and controls<\/li>\n<li id=\"fa4c\" class=\"ob oc gr od b hp pz of og hs qa oi oj ok qb om on oo qc oq or os qd ou ov ow qe px py bj\">Level of automation regarding security processes, tooling, and controls<\/li>\n<li id=\"8e76\" class=\"ob oc gr od b hp pz of og hs qa oi oj ok qb om on oo qc oq or os qd ou ov ow qe px py bj\">Current state of vulnerabilities and patches (i.e., up to date vs. pending release)<\/li>\n<\/ul>\n<p id=\"6ac0\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">To help determine the overall security posture for a given risk, we\u2019ve established a Security Risk Operating Committee comprised of subject matter experts. These experts meet frequently with the security risk management team to provide expert insight, knowledge, and guidance to be considered during the risk evaluation process. Once we determine security posture, we can calculate the remaining residual risk.<\/p>\n<p id=\"36dc\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">It\u2019s important to define your organization\u2019s residual risk thresholds. These thresholds may be either quantitative (e.g., a score above 75, impacting X $\u2019s of annualized revenue) or qualitative (e.g., High or above) in nature. Any risk resulting in a residual risk at or above the threshold is reported to the Risk Steering Committee or appropriate leadership team in the organization for risk-response prioritization and decision-making.<\/p>\n<p id=\"288b\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">By establishing clear, documented processes for assessing security risks, we can create an agile methodology that quickly arms leadership with the appropriate information to make decisions on the highest, and most critical, risk issues facing the organization.<\/p>\n<figure class=\"nq nr ns nt nu nv nn no paragraph-image\">\n<div role=\"button\" tabindex=\"0\" class=\"nw nx fg ny bg nz\">\n<div class=\"nn no qo\"><picture><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/format:webp\/1*8U1M5ltyVWesjI8hcebusA.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/format:webp\/1*8U1M5ltyVWesjI8hcebusA.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/format:webp\/1*8U1M5ltyVWesjI8hcebusA.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/format:webp\/1*8U1M5ltyVWesjI8hcebusA.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/format:webp\/1*8U1M5ltyVWesjI8hcebusA.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/format:webp\/1*8U1M5ltyVWesjI8hcebusA.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/format:webp\/1*8U1M5ltyVWesjI8hcebusA.png 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" type=\"image\/webp\"\/><source data-testid=\"og\" srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/1*8U1M5ltyVWesjI8hcebusA.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/1*8U1M5ltyVWesjI8hcebusA.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/1*8U1M5ltyVWesjI8hcebusA.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/1*8U1M5ltyVWesjI8hcebusA.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/1*8U1M5ltyVWesjI8hcebusA.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/1*8U1M5ltyVWesjI8hcebusA.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/1*8U1M5ltyVWesjI8hcebusA.png 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\"\/><img loading=\"lazy\" alt=\"\" class=\"bg mv oa c\" width=\"700\" height=\"607\" loading=\"lazy\" role=\"presentation\"\/><\/picture><\/div>\n<\/div>\n<\/figure>\n<h2 id=\"e6e8\" class=\"oy oz gr be pa pb pc dx pd pe pf dz pg ok ph pi pj oo pk pl pm os pn po pp pq bj\">Conclusion<\/h2>\n<p id=\"fe12\" class=\"pw-post-body-paragraph ob oc gr od b hp pr of og hs ps oi oj ok pt om on oo pu oq or os pv ou ov ow gk bj\">Security risk management can quickly become a convoluted process, often requiring input from multiple teams and resulting in delayed decision-making. To ensure their resources are continually focused on addressing the most critical issues, it is crucial for organizations to establish agile and continuous risk evaluation programs. Threats are evolving and attacks are constantly changing. Are you evolving your risk program to keep up?<\/p>\n<p id=\"6dba\" class=\"pw-post-body-paragraph ob oc gr od b hp oe of og hs oh oi oj ok ol om on oo op oq or os ot ou ov ow gk bj\">If you\u2019re interested in having a deeper conversation or joining a risk knowledge-sharing session, please contact us at <a class=\"af ie\" href=\"https:\/\/blog.developer.adobe.com\/mailto:securityrisk@adobe.com\" rel=\"noopener ugc nofollow\" target=\"_blank\">securityrisk@adobe.com<\/a>.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/blog.developer.adobe.com\/building-an-agile-security-risk-management-program-b18dd28143be?source=rss----9342990108af---4\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Matt Carroll, Senior Manager, Technology Governance, Risk, &amp; Compliance Getting dressed is a routine example of everyday life that is packed full of choices. Should I wear pants or shorts? Do I need a sweater? Shoes or sandals? While we may make these choices subconsciously, I would argue that even actions that don\u2019t appear [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8576,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[19],"tags":[],"class_list":["post-8575","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-graphics-design"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/posts\/8575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/comments?post=8575"}],"version-history":[{"count":0,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/posts\/8575\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/media\/8576"}],"wp:attachment":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/media?parent=8575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/categories?post=8575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/tags?post=8575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}