
Factor Analysis of Information Risk (FAIR) has emerged as the standard Value at Risk (VaR) framework for cybersecurity and operational risk.
The FAIR Institute is a non-profit professional organization dedicated to advancing the discipline of measuring and managing information risk.
It provides information risk, cybersecurity and business executives with the standards and best practices to help organizations measure, manage and report on information risk from the business perspective. The FAIR Institute and its community focus on innovation, education and sharing of best practices to advance FAIR and the information risk management profession.
Jun 8, 2023 7:30:00 AM
At the recent FAIR Institute London Summit, Pooya Alai and Rebekka Kurland of the cybersecurity risk team at Maersk, the global shipping and logistics giant, presented a FAIR case study with a message about communicating to stakeholders
Jun 7, 2023 12:57:53 PM
FAIR Institute Chairman Jack Jones laid down a challenge to the FAIR Institute’s annual breakfast meeting during the Gartner Security & Risk Summit this week near Washington, DC.
Jun 5, 2023 12:27:04 PM
In this blog post series, we’re examining how artificial intelligence (AI) is rapidly reshaping the threat landscape, and how to approach quantifying the resulting loss metrics using Factor Analysis of Information Risk (FAIR). Our last blog post explored Insider Threat
Feb 15, 2023 5:09:00 PM
I recently had a conversation with clients around a risk analysis they conducted and noticed as they walked me through it that they seemed to get hung up on the terms “inherent risk” and “residual...
Read More >>Feb 7, 2023 4:49:00 PM
The terms “risk appetite” and its close cousin “risk tolerance” are often poorly understood, very rarely used to good effect, and commonly used interchangeably.
Similar to the word “risk,” you will...
Read More >>Feb 6, 2019 2:00:00 PM
FAIR model creator Jack Jones recently answered a FAIR Institute member's question about terminology that's one of those easily confused yet critical distinctions in cyber risk management: What's the...
Read More >>