Information Security Risk definition

Information Security Risk means any risk that might adversely affect Information Security including, but not limited to, a Breach of Security. “ISO/IEC 27001, ISO/IEC 27002 and ISO 22301 shall mean a) ISO/IEC 27001; b) ISO/IEC 27002/IEC; and c) ISO 22301 in each case as most recently published by the International Organization for Standardization or its successor entity (the “ISO”) or the relevant successor or replacement information security standard which is formally recommended by the ISO.
Information Security Risk means the risk to organisational civil aviation operations, assets, individuals, and other organisations due to the potential of an information security event. Information security risks are associated with the potential that threats will exploit vulnerabilities of an information asset or group of information assets;
Information Security Risk means any risk that might adversely affect Information Security including, but not limited to, a Breach of Security. ISAE 3402 shall mean the International Standard on Assurance Engagements No. 3402 (ISAE) as most recently published by the International Auditing and Assurance Standards Board or its successor entity (“IAASB”) or the relevant successor or replacement standard which is formally recommended by the IAASB. “ISO/IEC 27001, shall mean: 22301 a) ISO/IEC 27001; b) ISO/IEC 27002/IEC; and c) ISO 22301 in each case as most recently published by the International Organization for Standardization or its successor entity (the “ISO”) or the relevant successor or replacement information security standard which is formally recommended by the ISO.

Examples of Information Security Risk in a sentence

  • The Texas HHS process is described in the Information Security Risk Assessment and Monitoring Procedures (IS- RAMP) that is published on the Texas HHS Internet website.


More Definitions of Information Security Risk

Information Security Risk means any risk that might adversely affect Information Security including, but not limited to, a Breach of Security. ISAE 3402 shall mean the International Standard on Assurance Engagements No. 3402 (ISAE) as most recently published by the International Auditing and Assurance Standards Board or its successor entity (“IAASB”) or the relevant successor or replacement standard which is formally recommended by the IAASB.
Information Security Risk means any risk that might adversely affect Information Security including, but not limited to, a Breach of Security. “ISO/IEC 27001, ISO/IEC 27002 and ISO 22301 shall mean a) ISO/IEC 27001; b) ISO/IEC 27002/IEC; and c) ISO 22301 in each case as most recently published by the International Organization for Standardization or its successor entity (the “ISO”) or the relevant successor or replacement information security standard which is formally recommended by the ISO. “NCSC” shall mean the National Cyber Security Centre or its successor entity (where applicable). “Penetration Test” shall mean a simulated attack on any Buyer assets, the Buyer’s systems environment (or any part thereof) or the Supplier’s systems environment (or any part thereof). “PCI DSS” shall mean the Payment Card Industry Data Security Standard as most recently published by the PCI Security Standards Council, LLC or its successor entity (the “PCI”). “Risk Profile” shall mean a description of any set of risk. The set of risks can contain those that relate to a whole organisation, part of an organisation or as otherwise applicable. “Security Test” shall include, but not be limited to, Penetration Test, Vulnerability Scan, Availability Test and any other security related test and audit. “Tigerscheme” shall mean a scheme for authorised penetration tests which scheme is managed by USW Commercial Services Ltd. “Vulnerability Scan” shall mean an ongoing activity to identify any potential vulnerability in any Buyer assets, the Buyer’s systems environment (or any part thereof) or the Supplier’s systems environment (or any part thereof).
Information Security Risk means any risk that might adversely affect In- formation Security including, but not limited to, a Breach of Security. “ISO/IEC 27001, ISO/IEC 27002 and ISO 22301 shall mean
Information Security Risk. Management The third party shall establish and maintain an information security risk management program to identify, assess, mitigate, and monitor risks associated with the security of information and systems. This program shall be aligned with industry best practices and standards such as ISO 27001 or NIST SP 800-53. The third party shall promptly notify Forvis Mazars of any significant changes to its risk profile.
Information Security Risk means any risk that might adversely affect Information Security including, but not limited to, a Breach of Security. “ISAE 3402” shall mean the International Standard on Assurance Engagements No. 3402 (ISAE) as most recently published by the International Auditing and Assurance Standards Board or its successor entity (“IAASB”) or the relevant successor or replacement standard which is formally recommended by the IAASB. “ISO/IEC 27001, ISO/IEC 27002 and ISO 22301 shall mean: a) ISO/IEC 27001; b) ISO/IEC 27002/IEC; and c) ISO 22301 in each case as most recently published by the International Organization for Standardization or its successor entity (the “ISO”) or the relevant successor or replacement information security standard which is formally recommended by the ISO.
Information Security Risk means any risk that might adversely affect Information Security including, but not limited to, a Breach of Security. ISAE 3402 shall mean the International Standard on Assurance Engagements No. 3402 (ISAE) as most recently published by the International Auditing and Assurance Standards Board or its successor entity (“IAASB”) or the relevant successor or replacement standard which is formally recommended by the IAASB. “ISO/IEC 27001, ISO/IEC 27002 and ISO 22301 shall mean: (a) ISO/IEC 27001; (b) ISO/IEC 27002/IEC; and (c) ISO 22301, in each case as most recently published by the International Organization for Standardization or its successor entity (the “ISO”) or the relevant successor or replacement information security standard which is formally recommended by the ISO. “NCSC” shall mean the National Cyber Security Centre or its successor entity (where applicable). “Penetration Test” shall mean a simulated attack on any Buyer Assets, the Buyer’s Systems Environment (or any part thereof) or the Supplier’s Systems Environment (or any part thereof). “Risk Profile” shall mean a description of any set of risks. The set of risks can contain those that relate to a whole organisation, part of an organisation or as otherwise applicable. “Security Policies” shall mean the Buyer’s Security Policies published by the Buyer from time to time and shall include any successor, replacement or additional Security Policies. The Security Policies are set out in Annex A to this Schedule 8. “Security Policies and Standards” shall mean the Security Policies and the Security Standards. “Security Standards” shall mean the Buyer’s Security Standards published by the Buyer from time to time and shall include any successor, replacement or additional Security Standards. The Security Standards are set out in Annex B to this Schedule 8. “Security Test” shall include, but not be limited to, Penetration Test, Vulnerability Scan, Availability Test and any other security related test and audit. “SSAE 16” shall mean the Statement on Standards for Attestation Engagements (SSAE) No. 16 as most recently published by the American Institute of Certified Public Accountants or its successor entity (“AICPA”) or the relevant successor or replacement standard which is formally recommended by the AICPA. “Supplier’s Systems Environment” shall mean any ICT systems provided by the Supplier (and Sub-contractor or Sub- processor) which are or may be used for the provision of the Services. “Tigerscheme” shall...
Information Security Risk means the risk to organisational operations, assets, individuals and other organisations due to the potential of an information security breach;