Build a Business-Driven IT Risk Management Program – Phase 2: Identify and Assess IT Risk


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

How do you prepare for IT-related threats and vulnerabilities that you are not already aware of? Now that you have created a strong risk governance framework that formalizes risk management within IT and connects it to the enterprise, use Info-Tech's approach to risk identification and assessment to reveal your most urgent risks.

  • Engage the right stakeholders in the risk identification process.
  • Use Info-Tech's 9 risk categories to identify and organize risks.
  • Establish business-approved risk thresholds for acceptable and unacceptable risk.
  • Conduct a streamlined assessment of all risks to separate acceptable and unacceptable risks.

Perform a deeper, cost-based assessment of prioritized risks.

Related Content

GET HELP Contact Us
×
VL Methodology