EDI InfoSec

EDI InfoSecEDI InfoSecEDI InfoSec

EDI InfoSec

EDI InfoSecEDI InfoSecEDI InfoSec
  • Home
  • Services
  • AI
  • Contact Us
  • Risk Management Handbook
  • More
    • Home
    • Services
    • AI
    • Contact Us
    • Risk Management Handbook

  • Home
  • Services
  • AI
  • Contact Us
  • Risk Management Handbook
Risk-based Security Review

A How to Handbook in 70 pages

Available now on Amazon

Buy Now

Risk-based Security Review


Security Review is complicated. Done well it assures US that the systems we use and the vendors we choose are capable of protecting our valuable information. Not done well, it can result in poorly protected systems where cyberattacks are likely to result in tampering, theft, or unauthorized disclosure of data causing loss of private information, trade secrets, and customer data. This can be very expensive in terms of reputational damage, out of pocket costs of remediation, data breach notification and credit protection for data breach victims and fines for failure to protect private information.   The mission of this book is to provide the basics of risk-based security review. To explain the process and steps to take, the information needed, what should be considered, documentation to gather, questions to ask, and how to assess the answers and other information. And finally, how to determine the risk of using a system, and how to complete the Security Review to ensure the best, most secure outcome for your organization. 


Some timely topics covered in this book:

  • Seven Security Essentials
  • When Do You Need A Security Review?
  • Raising the Bar on Cybersecurity with Risk-based Security Review
  • The Process of Security Review
  • Eleven Steps in Security Review 
  • Identifying Security Gaps o Factoring in the Risk


While gathering the CPEs for her CISSP credential renewal Ellen looked for a series of short books targeting different facets of the work she does daily, so she could quickly build her knowledge base and gain 5 CPEs at the same time. This book is the first in what may be a series of short (50-70 page) books on timely cybersecurity topics for practitioners.

About the Author

Ellen Dutton, CISSP

  

Ellen Dutton has done security review, information risk management and security architecture in investment banking, pharmaceutical, healthcare, energy and government, and contributed heavily to Congressional briefings on computer security. Ellen wrote CISSP 2019 exam questions at the invitation of (ISC)2.

System design, development, prog

  

Ellen Dutton has done security review, information risk management and security architecture in investment banking, pharmaceutical, healthcare, energy and government, and contributed heavily to Congressional briefings on computer security. Ellen wrote CISSP 2019 exam questions at the invitation of (ISC)2.

System design, development, programming, product development and project management was her focus before the emergence of local area networks and the Internet put our precious information resources at risk.

Ellen is delighted to hear from other cybersecurity practitioners about their challenges, concerns and triumphs. Her email is: EllenDutton@electronicdatainfosec.com

Connect With Us

Downloads

risk-based-security-review-questionnaire-sample (xlsx)

Download

Copyright © 2026 EDI InfoSec - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept