The ISF’s Information Risk Assessment Methodology 2 (IRAM2) is a globally recognised approach that enables risk practitioners to perform end-to-end business focused information risk assessment in a way that supports engagement with business stakeholders.

Our consultants will help your organisation realise the full potential of IRAM2 by:

  • defining a risk appetite and supporting resources (for example, a Business Impact Reference Table) to reflect the risk posture of your management and nature of your business
  • Identifying your threat profile to highlight threat actors, threat attributes and threat events that are relevant to your organisation.
  • Assessing existing vulnerabilities
  • Helping you to develop pragmatic risk treatment plans.

ISF consultants can either train your own staff to perform IRAM2 risk assessments, undertake full risk assessments for you, or deliver a combination of these approaches.

Case Study:

ISF Consultants helped a large organisation from the Oil and Gas sector to carry out the Scoping, Business Impact Assessment, Threat Profiling and Vulnerability Assessment phrases of IRAM2 risk assessment methodology, culminating in a comprehensive plan to mitigate risk to a critical business system.

Consultancy Services Overview

Information Risk Assessment (IRAM2)

Please fill out the form below to download a complimentary Consultancy Services Overview.

Please provide your details to download this document:

The Information Security Forum (ISF) is a data controller for the personal data collected on this website.

For information on how we collect and use your personal data, please read our Privacy Notice.

Please read and agree with our Terms Of Use.

From time to time, the ISF would like to contact you regarding our latest products, services and events.

By ticking the relevant boxes below, please indicate your preferences on how you want to be contacted:

You can update your preferences at any time, or withdraw consent after submission by going to the ‘Already Registered’ tab.

Please enter the email address you previously registered with to access the download:

You have previously downloaded from our website. For more information on how we use your personal information, please see our Privacy Notice.

Please refamiliarise yourself with our Terms Of Use.

To update your preferences on how you would like to be contacted by the ISF, please indicate below:

To unsubscribe from all ISF communications. Click here: