Showing 1 - 10 of 16 results for the OCTAVE
These assets all relate to OCTAVE: What it is, how to use it, and its value.
This second version of the 2010 report presents a taxonomy of operational cyber security risks and harmonizes it with other risk and security activities.
In this podcast, the presenters discuss IT risk assessment and analysis, and comparison factors for selecting methods that are a good fit for your organization.
This 2001 report defines a general approach for evaluating and managing information security risks.
The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) is a framework for identifying and managing information security risks.
In this report, the authors describe how OCTAVE has been used and tailored to fit a wide range of organizational risk assessment needs.
In this 2007 report, the authors highlight the design considerations and requirements for OCTAVE Allegro based on field experience.
In this report, the authors describe OCTAVE practices, which enable organizations to identify risks and mitigate them.
In this book, the authors provide a systematic way to evaluate and manage information security risks through the use of the OCTAVE approach.
In this list of preliminary activities, the authors describe activities you will complete to implement the OCTAVE method.