HOME OF FAIR | THE STANDARD QUANTITATIVE MODEL FOR INFORMATION SECURITY AND OPERATIONAL RISK

Join leading information risk, cybersecurity and business executives to collaborate on the development and the sharing of industry-leading best practices for quantifying and managing information risk.

What is the FAIR Institute?

The FAIRTM (Factor Analysis of Information Risk) cyber risk framework has emerged as the premier Value at Risk (VaR) framework for cybersecurity and operational risk. The FAIRTM Institute is a non-profit professional organization dedicated to advancing the discipline of measuring and managing information risk.

It provides information risk, cybersecurity and business executives with the standards and best practices to help organizations measure, manage and report on information risk from the business perspective. The FAIRTM Institute and its community focus on innovation, education and sharing of best practices to advance the FAIRTM cyber risk framework and the information risk management profession.

11000+
Members Worldwide
45%
Fortune 1000 Orgs.
23
Local Chapters
SCAWARDS2019_winner (002)
 

The FAIR Institute is extremely proud to be named one of the
'Three Most Important Industry Organizations of the Last 30 Years'
at the 2019 SC Awards.

Read More here
A STANDARD BY
partners_12
TECHNICAL ADVISOR
partners_09
SPONSORS

 IBM       RiskRecon-1   

Protiviti FI homepage logo

EDUCATION PARTNERS

SJSU     WASHSTL        UMass Amherst       Ferris-State       CMU        Pepperdine       VT   

ASU   University of Tampa    University of Toronto    Georgia Southern      georgemason     Macquarie 

Learn more about our Education Partners

RECENT BLOGS

Senate Confirms Chris Inglis, Former NSA Deputy Director and FAIR Conference Speaker, to Be National Cyber Director

The Senate has confirmed the nomination of Chris Inglis as the new national cyber director, coordinating cybersecurity across civilian agencies from the White House.

Read More >>

Calculating Your Company’s Total Cybersecurity Risk Exposure (Part 2)

In the first part of my blog post I focused on calculating the impact of a cybersecurity breach in relation to a company’s size and industry. In part two, I present an approach to better understand how often a company will experience security breaches.

Read More >>

Analyze the Risk of Ransomware – 5-Step Guide for Quantitative Analysis

In a recent webinar “Ransomware, Colonial Pipeline: A FAIR Perspective” RiskLens expert Cary Wise and Mike Radigan, a cyber risk management executive for a Fortune 100 company

Read More >>

SEE ALL BLOGS

POPULAR BLOGS

Post Image
Inherent Risk vs. Residual Risk Explained in 90 Seconds

I recently had a conversation with clients around a risk analysis they conducted and noticed as they walked me through it that they seemed to get hung up on the terms “inherent risk” and “residual...

Read More >>
Post Image
'Risk Appetite' vs. 'Risk Tolerance'. What’s the Difference?

The terms “risk appetite” and its close cousin “risk tolerance” are often poorly understood, very rarely used to good effect, and commonly used interchangeably.

Similar to the word “risk,” you will...

Read More >>
Post Image
Risk Analysis vs. Risk Assessment: What's the Difference?

Yes, this is Cyber Risk 101, but risk analysis vs risk assessment is common confusion, so let Jack Jones explain it in an excerpt from his book Measuring and Managing Information Risk: A FAIR Approach

Read More >>