Please enable JavaScript.
Coggle requires JavaScript to display documents.
Conduct an Information Risk Assessment (Scope (Infrastructure,…
Conduct an Information Risk Assessment
Deploy
Countermeasures
Reduce Risk
Remediate
Compensating Controls
Avoid Risk
Change course
Transfer Risk
Buy insurance
Transfer to third party
Risk Acceptance
Evaluate
Threats- Appendix D p66
Vulnerabilities
Business process risk
Business practice risk
Likelihood-Appendix D p67
Impact
[Emerging
Threats
Discover
Customer information
HIPAA information
Personally identifiable information
Employee information
Scope
Infrastructure
Applications
Data Quality
Cybersecurity
Third Party
Financial reporting
Internal Fraud
External Fraud
Business continuity
Employee practices
Physical Security
Inventory
Inventory
Manage
Manage