Build a Business-Driven IT Risk Management Program – Phase 2: Identify and Assess IT Risk

Author(s): Scott Janz, Eric Dolinar

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

How do you prepare for IT-related threats and vulnerabilities that you are not already aware of? Now that you have created a strong risk governance framework that formalizes risk management within IT and connects it to the enterprise, use Info-Tech's approach to risk identification and assessment to reveal your most urgent risks.

  • Engage the right stakeholders in the risk identification process.
  • Use Info-Tech's 9 risk categories to identify and organize risks.
  • Establish business-approved risk thresholds for acceptable and unacceptable risk.
  • Conduct a streamlined assessment of all risks to separate acceptable and unacceptable risks.

Perform a deeper, cost-based assessment of prioritized risks.

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019