top of page

WELCOME
The Security Risk Management Aide-Memoire (SRMAM) is a short book based on the Security Risk Management Body of Knowledge (SRMBOK) with additional material, new research, and changes to reflect the 2018 ISO31000 Risk Management Standard update. You can read most of the chapters in the blog articles below, plus new material that will form the basis for a second edition in the coming years.
Search
The SRMBOK Maturity Model
Security Risk Management Body Of Knowledge (SRMBOK) The SRMBOK maturity model addresses the following four levels: Level 1 INITIAL Level...
jt
Sep 14, 20202 min read
341 views
0 comments
Security Risk Assessment Reports - Two Ways
Report Headings Example 1 The following is one example of how to structure a Security Risk Assessment. TERMS AND DEFINITIONS TABLE OF...
jt
Sep 7, 20201 min read
146 views
0 comments
How to Structure a Security Risk Assessment Request
Project Brief Headings Example The following is one example of how to structure a consultant's brief or request for quotation to conduct...
jt
Aug 31, 20201 min read
137 views
0 comments
How to Structure a Security Plan
Security Plan Headings Example The following is one example of how to structure a Security Plan. You can download a template from...
jt
Aug 24, 20201 min read
296 views
0 comments


The Real Cost of Risk Treatments
The Nature of Risk Treatments Here are several levels of expenditure to consider when implementing treatments: Sunk costs – funds that...
jt
Aug 17, 20201 min read
76 views
0 comments
Writing Treatment Plans
Treatment Plans - A Brief Template The following headings may be suitable for many treatment registers. Serial (Treatment ID) Treatment...
jt
Aug 10, 20201 min read
361 views
0 comments
Which Risk Treatment to Choose? An 8-step Process
Eight Step Process For Selecting Risk Treatments The following process can help identify treatments for complex risks. It can be used for...
jt
Aug 3, 20201 min read
201 views
0 comments


The ISO-31000 Approach to Risk Treatment
Selecting Risk Treatments ISO31000 suggests applying one or more of the following approaches to treating risks: Avoiding the risk by...
jt
Jul 27, 20201 min read
579 views
0 comments


Vulnerability and control
And no, this isn't about being a control freak, or feeling vulnerable. Well not exactly. As you've probably already guessed (given that...

Julian Talbot
Jul 22, 20202 min read
67 views
0 comments
How to Document Complex Treatments?
📷 The following elements provide an example of a high level overview of complex risk treatments. Each risk treatment in theTreatment...
jt
Jul 20, 20201 min read
75 views
0 comments


How to Communicate Risk Visually
Communication and consultation is an iterative, two (or more) way process, which applies at all stages of risk management....
jt
Jul 13, 20201 min read
137 views
0 comments


How to Structure a Security Briefing
Security Briefings The five paragraph order technique, also known as SMEAC, is a technique used by many military agencies to deliver a...
jt
Jul 6, 20201 min read
6,590 views
0 comments


What is Expected Monetary Value?
While it is difficult to precisely quantify all loss events, even after they occur (e.g. the event’s impact on your brand), many risks...
jt
Jun 29, 20201 min read
155 views
0 comments
Where to Start with Risk Analysis? Inputs
Inputs to aid risk analysis can include the elements listed below. Note: The grouping (input, process, output, feedback) is purely...
jt
Jun 22, 20201 min read
60 views
0 comments


How Should You Structure Likelihood and Consequence Tables?
There is no single correct way to express likelihood or consequence tables. Each organization needs to consider their context and develop...
jt
Jun 15, 20201 min read
496 views
0 comments


Probability and Modelling Risk Expectancy
Probability of an Event One of the challenges with Security Risk Assessment is the analysis of rare but catastrophic events. Events for...
jt
Jun 8, 20203 min read
83 views
0 comments


What is the Stroud Matrix?
The objective of this tool is to aid discussion and provide an initial categorization of risks into four groups: BUSINESS AS USUAL (BAU):...
jt
Jun 1, 20201 min read
278 views
0 comments


What are Risk Matrices, and Should I Use Them?
Risk matrices are commonly used in many risk management practices. There are a number of issues with risk matrices and overall, I would...

Julian Talbot
May 25, 20203 min read
2,379 views
0 comments


How Do You Estimate Risk?
Risk is an abstract concept and humans are notoriously bad at predicting it.¹ A 1%chance of an event occurring does not mean that it...
jt
May 18, 20202 min read
69 views
0 comments
How Can We Effectively Use Our Risk Management Findings and Recommendations?
When conducting a security risk assessment, it is important to document some of the key findings as evidence to support the risk register...
jt
May 11, 20202 min read
39 views
0 comments
bottom of page