Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

How do you prepare for IT-related threats and vulnerabilities that you are not already aware of? Now that you have created a strong risk governance framework that formalizes risk management within IT and connects it to the enterprise, use Info-Tech's approach to risk identification and assessment to reveal your most urgent risks.

  • Engage the right stakeholders in the risk identification process.
  • Use Info-Tech's 9 risk categories to identify and organize risks.
  • Establish business-approved risk thresholds for acceptable and unacceptable risk.
  • Conduct a streamlined assessment of all risks to separate acceptable and unacceptable risks.

Perform a deeper, cost-based assessment of prioritized risks.

Also In

Build a Business-Driven IT Risk Management Program

Hope is not a risk management strategy.

Related Content


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.