By Jeffrey A. Slotnick CPP, PSP, President Setracon, Inc. & Keynote Speaker at The Great Conversation, ASG Security Summit & Expo
Having conducted risk, threat, and vulnerability assessments for some years now, I have encountered an issue which seems common to many organizations.
How do I manage and utilized the data I have collected on my assessment?
Most small businesses to large enterprises have conducted some sort of assessment. Whether it was for Security, Business Continuity, or Continuity of Operations, the first step in this process for all of these is a comprehensive risk assessment. If the organization is serious about risk identification they have revisited these assessments and refreshed them several times.