Build a Business-Driven IT Risk Management Program – Phase 2: Identify and Assess IT Risk


Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

How do you prepare for IT-related threats and vulnerabilities that you are not already aware of? Now that you have created a strong risk governance framework that formalizes risk management within IT and connects it to the enterprise, use Info-Tech's approach to risk identification and assessment to reveal your most urgent risks.

  • Engage the right stakeholders in the risk identification process.
  • Use Info-Tech's 9 risk categories to identify and organize risks.
  • Establish business-approved risk thresholds for acceptable and unacceptable risk.
  • Conduct a streamlined assessment of all risks to separate acceptable and unacceptable risks.
Perform a deeper, cost-based assessment of prioritized risks.

Related Content

GET HELP Contact Us
VL Methodology