This content is retired but we have related up-to-date content below.
Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

In this last phase, the results of the risk register will be secured and communicated. It will also be the starting point of taking these risks and incorporating them into security strategy efforts. This phase will take you through the following activities:

  • Manage and secure the risk register document.
  • Communicate conclusions drawn from the risk register.
  • Leverage risk-based conclusions into security decisions.

Use this phase as part of the full blueprint, Develop and Implement a Security Risk Management Program.

Related Content


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.