Business A.M
No Result
View All Result
Monday, February 23, 2026
  • Login
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
Subscribe
Business A.M
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
No Result
View All Result
Business A.M
No Result
View All Result
Home Analyst Insight

The RIIOT approach in information security assessment 

by Admin
January 21, 2026
in Analyst Insight
One of the core elements in information security assessment and, perhaps, the foundational piece in any information security analysis, is the gathering of data. The data gathered informs and guides the stakeholder about the necessary steps to employ, who to ask questions and more importantly, inspires security controls that must be embedded within the organisation. Yet, most organisations tend to misplace this step, and this often leads to vulnerabilities and threats. The data gathering step is labour intensive, requires excellent project management and feeds into the creation of controls that can help companies protect their data sets.

 

There are many ways a company can go about it but, in this article, we focus on Douglas Landoll’s RIIOT approach.

 

RIIOT stands for simple steps which are Review, Interview, Inspect, Observe, and Test method of data gathering. The ideology in this approach is to break down processes and tease out the necessary benefits towards highlighting the highest possible risks within any organisation. The main benefit in this approach is that it helps organise a clearly defined data gathering effort, enables management of multiple tasks, and helps stakeholders ensure that they are covering appropriate threats and vulnerabilities. This is not to state that this is the best approach or the single approach in information security assessment. Organisations are advised to use what works for them.

 

For information security the review stage covers and attempts to unpack the layout, IT architecture and other elements of the security controls within an organisation. To put it in another way, it is surveying the landscape for all things available, trying to understand the land and through the analysis, coming up with ways to approach the project.

 

The interview stage entails interviewing key personnel to determine their ability to perform their duties and understanding how their duties feed into the policies, procedures and network maps. This interviewing stage would give the information security personnel an idea of business process owners and more so, how their role ties into the whole information security dynamic.

 

The next step is — inspect security control — which entails inspecting implemented security controls such as visitor controls, configuration files, smoke detectors, and incident response handling. What’s best practice is for this control to be judged against industry standards. For example, if it’s a payment card processing company, then employing Payment Card Industry controls would be the best approach for this organisation.

 

There is the absolute need to observe personal behaviour of users. These levels of observations provide essential insight into the effectiveness of the security controls in place in a company. There is no need to employ security controls when they can’t be verified. What usually transpires in most organisations is that there is the belief that once a control is in place then that’s it. No. The best approach is to test these controls regularly with the intention of finding new ways of improving or tightening the security.

 

The last phase covers testing which entails using firewalls, servers, open-door alarms, and motion sensors. Testing might also involve the use of vulnerability scanners for logical security controls and companies must develop specific methods for physical controls such as shuffle tests for motion sensors.

 

The RIOTT approach is usually employed in most information security methodology, and it is a proven approach which any organisation can use in their information management schema. However, a caveat must be added: check with a consultant on how best to use this in your organisation.

 

  • business a.m. commits to publishing a diversity of views, opinions and comments. It, therefore, welcomes your reaction to this and any of our articles via email: comment@businessamlive.com
Admin
Admin
Previous Post

Customer experience and the metaverse in aviation

Next Post

Inflation’s Emotional Scars

Next Post

Inflation’s Emotional Scars

  • Trending
  • Comments
  • Latest
Igbobi alumni raise over N1bn in one week as private capital fills education gap

Igbobi alumni raise over N1bn in one week as private capital fills education gap

February 11, 2026
NGX taps tech advancements to drive N4.63tr capital growth in H1

Insurance-fuelled rally pushes NGX to record high

August 8, 2025

Reps summon Ameachi, others over railway contracts, $500m China loan

July 29, 2025

CBN to issue N1.5bn loan for youth led agric expansion in Plateau

July 29, 2025

6 MLB teams that could use upgrades at the trade deadline

Top NFL Draft picks react to their Madden NFL 16 ratings

Paul Pierce said there was ‘no way’ he could play for Lakers

Arian Foster agrees to buy books for a fan after he asked on Twitter

BASL trains staff on autism support to raise inclusive passenger experience

BASL trains staff on autism support to raise inclusive passenger experience

February 23, 2026
Lagos-Owerri ValueJet flight joins daily schedule, March, 23

Lagos-Owerri ValueJet flight joins daily schedule, March, 23

February 23, 2026
MISR Insurance eyes Nigeria following talks with NAICOM

MISR Insurance eyes Nigeria following talks with NAICOM

February 23, 2026
Omosehin drives NAICOM reform agenda as recapitalisation deadline looms

Omosehin drives NAICOM reform agenda as recapitalisation deadline looms

February 23, 2026

Popular News

  • Igbobi alumni raise over N1bn in one week as private capital fills education gap

    Igbobi alumni raise over N1bn in one week as private capital fills education gap

    0 shares
    Share 0 Tweet 0
  • Insurance-fuelled rally pushes NGX to record high

    0 shares
    Share 0 Tweet 0
  • Reps summon Ameachi, others over railway contracts, $500m China loan

    0 shares
    Share 0 Tweet 0
  • CBN to issue N1.5bn loan for youth led agric expansion in Plateau

    0 shares
    Share 0 Tweet 0
  • Glo, Dangote, Airtel, 7 others prequalified to bid for 9Mobile acquisition

    0 shares
    Share 0 Tweet 0
Currently Playing

CNN on Nigeria Aviation

CNN on Nigeria Aviation

Business AM TV

Edeme Kelikume Interview With Business AM TV

Business AM TV

Business A M 2021 Mutual Funds Outlook And Award Promo Video

Business AM TV

Recent News

BASL trains staff on autism support to raise inclusive passenger experience

BASL trains staff on autism support to raise inclusive passenger experience

February 23, 2026
Lagos-Owerri ValueJet flight joins daily schedule, March, 23

Lagos-Owerri ValueJet flight joins daily schedule, March, 23

February 23, 2026

Categories

  • Frontpage
  • Analyst Insight
  • Business AM TV
  • Comments
  • Commodities
  • Finance
  • Markets
  • Technology
  • The Business Traveller & Hospitality
  • World Business & Economy

Site Navigation

  • Home
  • About Us
  • Contact Us
  • Privacy & Policy
Business A.M

BusinessAMLive (businessamlive.com) is a leading online business news and information platform focused on providing timely, insightful and comprehensive coverage of economic, financial, and business developments in Nigeria, Africa and around the world.

© 2026 Business A.M

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us

© 2026 Business A.M