HOME OF FAIR

THE STANDARD QUANTITATIVE MODEL FOR INFORMATION SECURITY AND OPERATIONAL RISK

Join leading information risk, cybersecurity and business executives to collaborate on the development and the sharing of industry-leading best practices for quantifying and managing information risk.

2018 FAIR CONFERENCE

Hosted on October 16 & 17 by the FAIR Institute and Carnegie Mellon University’s Software Engineering Institute (SEI) and the Heinz College of Information Systems and Public Policy, the 2018 FAIR Conference brings leaders in information and operational risk management together to explore best FAIR practices that produce greater value and alignment with business goals.

Learn More about FAIRCON18

A STANDARD BY
partners_12
TECHNICAL ADVISOR
partners_09
SPONSORS
RSA       riskrecon
EDUCATION PARTNERS

SJSU     WASHSTL        UMass Amherst       Ferris State       CMU        Pepperdine       VT   Marymount University  

ASU   University of Tampa    University of Toronto      Seattle Pacific      Georgia Southern      GMU     Macquarie     WU

Learn more about our Education Partners

RECENT BLOGS

“From No Data to Drowning in Data – A Reality Check”: Jack Jones Speaks at RSA

“Your organization has data regarding umpteen thousand unpatched vulnerabilities…So what? What decisions need to be made?” FAIR Institute Chairman Jack Jones asked an audience at the RSA Conference this week

Read More >>

How to Model Controls in a FAIR Risk Analysis

As a former auditor, I understand the value a control has for an organization, a process or an application.  But, I’ll be honest I used to think a control was one dimensional. It didn’t really matter what the control protected, if the control wasn’t functioning properly or configured exactly to a ‘T’, it was failing.

Read More >>

FAIR Institute Expands Education Partnerships

In September, 2017,  the FAIR Institute launched the FAIR University Curriculum with the goal of helping to fill a void in the industry by assisting academia in building information risk management programs and developing the next generation of cyber risk executives.

Read More >>

SEE ALL BLOGS

POPULAR BLOGS

Post Image
Inherent Risk vs. Residual Risk Explained in 90 Seconds

I recently had a conversation with clients around a risk analysis they conducted and noticed as they walked me through it that they seemed to get hung up on the terms “inherent risk” and “residual...

Read More >>
Post Image
'Risk Appetite' vs. 'Risk Tolerance'. What’s the Difference?

The terms “risk appetite” and its close cousin “risk tolerance” are often poorly understood, very rarely used to good effect, and commonly used interchangeably.

Similar to the word “risk,” you will...

Read More >>
Post Image
5 Must Read Books to Jumpstart Your Career in Risk Management

What are the must have resources for people new to operational and cyber risk? This list outlines what books I would recommend to new analyst or manager.

They’re not ranked by which book is best....

Read More >>