List and Edit

Unit / ProjectStation / HubRisk Event or observationRisk CategoryIs it internal (i) or external (e)?Possible CausesPossible ConsequencesEstimated Value at Risk (Optional)Estimated Loss (Optional)Likelihood of occurrenceImpact of OperationsWeight of identfied risk 1 (Likelihood x Impact)Current efforts / control in placeControl GapsAdditional Controls RequiredPerson Responsible for further actionsEdit EntryDelete Entry
Unit / ProjectStation / HubRisk Event or observationRisk CategoryIs it internal (i) or external (e)?Possible CausesPossible ConsequencesEstimated Value at Risk (Optional)Estimated Loss (Optional)Likelihood of occurrenceImpact of OperationsWeight of identfied risk 1 (Likelihood x Impact)Current efforts / control in placeControl GapsAdditional Controls RequiredPerson Responsible for further actionsEdit EntryDelete Entry

Related Posts

IT Risks, Risk Mgt

HACKERS EXPLOITING POOR SOFTWARE SERVICE CONNECTIONS

Hackers are increasingly exploiting poor software service connections between IT platforms and businesses, according to an IT security report. In particular, businesses often ignore the way their systems are configured with software as a service providers. In the report’s survey, up to 63 per cent either said security problems arose in this area – or might have done. [...]