Showing 1 - 10 of 15 results for the OCTAVE
These assets all relate to OCTAVE: What it is, how to use it, and its value.
This second version of the 2010 report presents a taxonomy of operational cyber security risks and harmonizes it with other risk and security activities.
In this podcast, the presenters discuss IT risk assessment and analysis, and comparison factors for selecting methods that are a good fit for your organization.
In this 2007 report, the authors highlight the design considerations and requirements for OCTAVE Allegro based on field experience.
In this report, the authors describe how OCTAVE has been used and tailored to fit a wide range of organizational risk assessment needs.
In this report, the authors describe everything you will need to understand and implement OCTAVE method.
In this 2005 handbook, the authors provide detailed guidelines for conducting an OCTAVE-S evaluation.
In this report, the authors describe OCTAVE practices, which enable organizations to identify risks and mitigate them.
This 2001 report defines a general approach for evaluating and managing information security risks.
In this book, the authors provide a systematic way to evaluate and manage information security risks through the use of the OCTAVE approach.