From the course: ISO 27001:2022-Compliant Cybersecurity: Getting Started

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Information security risk assessment (Clause 6.1.2)

Information security risk assessment (Clause 6.1.2)

From the course: ISO 27001:2022-Compliant Cybersecurity: Getting Started

Information security risk assessment (Clause 6.1.2)

- [Instructor] ISO 27001 leans heavily on the use of risk management as a way to protect information and help ensure that the information security management system, or ISMS, can achieve its intended outcomes. This explains why Clause 6.1 called Actions to Address Risks and Opportunities is the longest and most detailed clause in clauses 4 through 10. In this video, you'll learn what ISO 27001 requires when it comes to information security risk assessment. Clause 6.1 is broken into three sections. The first section, Clause 6.1.1, is called Genera, and it explains why risk management is needed, and how it must be part of the ISMS. The second section is Clause 6.1.2 called Information Security Risk Assessment, and it breaks down how risks must be identified, analyzed, and evaluated. Clause 6.1.3 is the third section, Information Security Risk Treatment, which describes actions organizations must take to treat the…

Contents