I. Identification and Prioritization of Assets
A. Identifying assets by understanding a business plan
B. Costs of system downtime
C. Prioritizing systems and assets
D. Calculating expected losses
E. Justifying costs for securing assets
F. Review of systems and audits
G. Resource priorities by organizational structure
II. Risk Identification
3. Trojan Horses and malware
4. Inside and outside attacks
1. Tornadoes, hurricanes, fires, and floods
2. Power outages and infrastructure malfunctions
C. Technology Assets at Risk
III. Risk Management and Documentation
A. Risk mitigation techniques
B. Recording system vulnerabilities and corrective actions
C. Essential documentation
D. Policies and procedures and industry standards
E. Legal, ethical, and fiduciary issues applicable to risk
management
|