HOME OF FAIR | THE STANDARD QUANTITATIVE MODEL FOR INFORMATION SECURITY AND OPERATIONAL RISK

Join the FAIR Institute Today

Join leading information risk, cybersecurity and business executives to collaborate on the development and the sharing of industry-leading best practices for quantifying and managing information risk.

What is the FAIR Institute?

Factor Analysis of Information Risk (FAIR) has emerged as the standard Value at Risk (VaR) framework for cybersecurity and operational risk.

The FAIR Institute is a non-profit professional organization dedicated to advancing the discipline of measuring and managing information risk.

It provides information risk, cybersecurity and business executives with the standards and best practices to help organizations measure, manage and report on information risk from the business perspective. The FAIR Institute and its community focus on innovation, education and sharing of best practices to advance FAIR and the information risk management profession.

3800+
Members Worldwide
30%
Fortune 100 Companies
14
Local Chapters
A STANDARD BY
partners_12
TECHNICAL ADVISOR
partners_09
SPONSORS

RSA    riskrecon  

 CyberVista

EDUCATION PARTNERS

SJSU     WASHSTL        UMass Amherst       Ferris State       CMU        Pepperdine       VT   Marymount University  

ASU   University of Tampa    University of Toronto      Related image     Georgia Southern      georgemason     Macquarie     WU

Learn more about our Education Partners

RECENT BLOGS

Meet a FAIR Institute Partner: Cindy Donaldson, Global Resilience Federation (GRF)

The FAIR Institute and the Global Resilience Federation (GRF)--a non-profit hub for industry groups and government to share intelligence on cyber and physical threats and vulnerabilities --recently formed a strategic partnership that includes providing discounted FAIR training to GRF members through the RiskLens Academy

Read More >>

[Video] FAIRCON18 Panel: How FAIR and TBM Work Together to Show the Business Value of Cybersecurity

In recent years, many CIOs in big enterprises and government have successfully positioned themselves as not just IT operators but business enablers, using the discipline of Technology Business Management (TBM), a set of best practices to consistently communicate both the cost and the value of IT services.

Read More >>

[Video] FAIRCON18 Panel Explains How to Bridge the Gap Between CISO and CRO

As the FAIR model and risk quantification brings cyber risk management in line with the rest of enterprise risk management, the roles of CISO and CRO also pull closer together. A panel discussion at the recent 2018 FAIR Conference showed a cooperative CISO/CRO relationship in action

Read More >>

SEE ALL BLOGS

POPULAR BLOGS

Post Image
Inherent Risk vs. Residual Risk Explained in 90 Seconds

I recently had a conversation with clients around a risk analysis they conducted and noticed as they walked me through it that they seemed to get hung up on the terms “inherent risk” and “residual...

Read More >>
Post Image
Risk Analysis vs. Risk Assessment: What's the Difference?

Yes, this is Cyber Risk 101, but risk analysis vs risk assessment is common confusion, so let Jack Jones explain it in an excerpt from his book Measuring and Managing Information Risk: A FAIR Approach

Read More >>
Post Image
'Risk Appetite' vs. 'Risk Tolerance'. What’s the Difference?

The terms “risk appetite” and its close cousin “risk tolerance” are often poorly understood, very rarely used to good effect, and commonly used interchangeably.

Similar to the word “risk,” you will...

Read More >>