What's Inside:

  • Defining goals of the risk assessment process
  • Documenting risk as a way to inform security decisions
  • How your current policies address your current risk posture
  • How you can identify unknown risks, without a policy in place

Once you have completed Phase Two – Data Usage Discovery & Visibility, you know where your data lives, how it moves, and who is accessing it. Now, you can map that to the business goals. This mapping allows you to spot activities where the risk outweighs the business benefit. You can then make informed decisions about acceptable vs unacceptable risk to the organization.

Sign Up

What's Inside:

  • Defining goals of the risk assessment process
  • Documenting risk as a way to inform security decisions
  • How your current policies address your current risk posture
  • How you can identify unknown risks, without a policy in place