Did you know…

Risk assessments must be performed on a regular basis, according to:
  • PCI DSS § 12.1.2
  • FISMA / NIST SP800-53 § RA-3
  • HIPAA § 164.308(a)(1)
  • ISO 27001 § A.14.1.2

  • Risk Assessment

    As the first iterative step in the Risk Management Program, a properly performed risk assessment allows you to identify threats and accurately gauge both the quantitative and qualitative values of risks.

    The risks for each company may be different, so it’s important to evaluate risk based on the classification of data, industry and the current security measures in place that can help mitigate potential issues.

    Partially derived from the National Institute of Standards and Technology's Special Publication 800-30 (Risk Management Guide for Information Technology Systems), our risk assessment service provides the groundwork for your organization to build and maintain a world-class Risk Management Program.

    The TECH LOCK Difference - TECH LOCK consultants understand that a risk management program involves all levels of management, and we tailor our risk assessments to match your company’s organizational structure. We also provide much more than a simple risk assessment - we give you document templates, free online resources, and a deeper understanding of the risk management process.

    if you would like to be contacted about our services.

    © 2009-2014 TECH LOCK, Inc. - 1000 John R Rd, Suite 201 - Troy, MI 48083
    Phone: +1 847 245 3727 | Fax: +1 866 941 8719
    E-Mail: info@techlockinc.com