In this last phase, the results of the risk register will be secured and communicated. It will also be the starting point of taking these risks and incorporating them into security strategy efforts. This phase will take you through the following activities:

  • Manage and secure the risk register document.
  • Communicate conclusions drawn from the risk register.
  • Leverage risk-based conclusions into security decisions.

Use this phase as part of the full blueprint, Develop and Implement a Security Risk Management Program.

Also In

Develop and Implement a Security Risk Management Program

With great risk management comes a great security program.

Related Content

Social

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.