HOME OF FAIR

THE STANDARD QUANTITATIVE MODEL FOR INFORMATION SECURITY AND OPERATIONAL RISK

Join leading information risk, cybersecurity and business executives to collaborate on the development and the sharing of industry-leading best practices for quantifying and managing information risk.

2018 FAIR CONFERENCE

Hosted on October 16 & 17 by the FAIR Institute and Carnegie Mellon University’s Software Engineering Institute (SEI) and the Heinz College of Information Systems and Public Policy, the 2018 FAIR Conference brings leaders in information and operational risk management together to explore best FAIR practices that produce greater value and alignment with business goals.

Learn More about FAIRCON18

A STANDARD BY
partners_12
TECHNICAL ADVISOR
partners_09
SPONSORS
RSA       riskrecon
EDUCATION PARTNERS

SJSU     WASHSTL        UMass Amherst       Ferris State       CMU        Pepperdine       VT   Marymount University  

ASU   University of Tampa    University of Toronto      Seattle Pacific      Georgia Southern      GMU     Macquarie     WU

Learn more about our Education Partners

RECENT BLOGS

Webinar: Solving the Third-Party Risk Equation at Scale

Enterprises operate their businesses on third-party platforms and services. Outsourcing of systems and services often involves significant risk, bestowing custodial responsibilities of large amounts of sensitive data and transaction capabilities to third-parties.

Read More >>

How to Use DREAD Analysis with FAIR

Let’s talk DREAD (the mnemonic threat assessment framework, not the overwhelming feeling of despair associated with your reoccurring 4:30 p.m. Friday meeting). So, what is DREAD?

Read More >>

Should Boards Establish a Separate Risk Committee?

In traditional board of directors committee structure, each of the board’s five main functions (strategy, executive selection and compensation, governance, audit, risk and compliance) is assigned to a different committee, except one: risk, long handled by the audit committee.

Read More >>

SEE ALL BLOGS

POPULAR BLOGS

Post Image
Inherent Risk vs. Residual Risk Explained in 90 Seconds

I recently had a conversation with clients around a risk analysis they conducted and noticed as they walked me through it that they seemed to get hung up on the terms “inherent risk” and “residual...

Read More >>
Post Image
'Risk Appetite' vs. 'Risk Tolerance'. What’s the Difference?

The terms “risk appetite” and its close cousin “risk tolerance” are often poorly understood, very rarely used to good effect, and commonly used interchangeably.

Similar to the word “risk,” you will...

Read More >>
Post Image
Risk Analysis vs. Risk Assessment: What's the Difference?

Yes, this is Cyber Risk 101, but risk analysis vs risk assessment is common confusion, so let Jack Jones explain it in an excerpt from his book Measuring and Managing Information Risk: A FAIR Approach

Read More >>