Portable Devices Risk Assessment

The FFIEC is clear about the need to conduct risk assessments focused on the deployment of new technologies. This document is an asset-based drill-down risk assessment that can be used to establish inherent and residual risk on vulnerabilities to smartphones (iPhones, Android Phones, Blackberries), tablets (iPads, Galaxy’s, Playbooks, etc.), and laptops.  It also includes a handy asset inventory.  It also helps prioritize the development and installation of technical and non-technical controls.

The Portable Devices Risk Assessment:

 

An excellent risk assessment for BYOD policies and procedures. This template makes a great format for use in new product risk analysis.  The assessment brainstorms vulnerabilities to mobile devices.  It covers both “Issued” or company-owned mobile devices and/or “Authorized” or Employee-Owned (BYOD) mobile devices.

This document goes hand-in-hand with the other documents in our “Mobile Devices Security Kit.”

In addition to an asset inventory questionnaire, it includes vulnerability assessments (with inherent, residual, and anticipated residual risk metrics) for tablets (iPads, Xooms, etc.), smartphones (iPhones, Android Phones, and Blackberries) and laptops (windows 7).  An excellent source for a list of mobile device security controls!

All templates are color-coded, and don’t forget, updates are free for three years and our boilerplates all come with a 30 Day Guarantee!

____________________________________________________

[add_to_cart item=”RMP_TOOLS_000001″]

____________________________________________________

Save when you purchase the kit!  [add_to_cart item=”kit_000001″]

____________________________________________________

Don’t forget, our boilerplates all come with a 30 Day Guarantee!

____________________________________________________

 

Related Posts

The Magnificent Seven 2023

Seven Trends . . . …that small bank Information Security Officers face in 2023 Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Welcom...