Governance Of Enterprise IT

Full Answer Section

     
  • Develop controls to mitigate the risks. This could include things like implementing security policies and procedures, using security software, and training employees on security best practices.
  • Monitor and update the risk assessment on an ongoing basis. This is important to ensure that the risks are being managed effectively and that new risks are being identified.
Here are some steps on how to start a ground-up risk assessment process:
  1. Establish a risk assessment team. This team should include representatives from all areas of the organization, including IT, finance, and legal.
  2. Define the scope of the risk assessment. This will include identifying the assets that need to be protected, the threats and vulnerabilities that these assets face, and the likelihood and impact of each threat.
  3. Gather information about the risks. This could include things like reviewing security policies and procedures, conducting interviews with employees, and scanning for vulnerabilities.
  4. Assess the risks. This will involve using a risk assessment methodology to determine the likelihood and impact of each threat.
  5. Develop risk mitigation strategies. This will involve implementing controls to reduce the likelihood and impact of each threat.
  6. Document the risk assessment findings. This will help to track the progress of the risk assessment and to ensure that the risks are being managed effectively.
The following people should be involved in the risk assessment process:
  • IT security manager
  • IT risk manager
  • Business unit managers
  • System owners
  • Security analysts
  • Compliance officers
  • Legal counsel
The following things will need to be reviewed for all applications purchased for IT:
  • The application's security features
  • The application's vendor's security track record
  • The application's compliance with security standards
  • The application's impact on the university's IT infrastructure
  • The application's cost
By following these steps, you can create a comprehensive risk assessment process that will help to protect the university's IT assets.  

Sample Solution

   
  • Identify the assets that need to be protected. This includes both physical assets, such as computers and servers, and data assets, such as student records and financial information.
  • Assess the threats and vulnerabilities that these assets face. This includes both internal threats, such as employee negligence, and external threats, such as cyberattacks.
  • Determine the likelihood and impact of each threat. This will help to prioritize the risks and focus resources on the most critical areas.

IS IT YOUR FIRST TIME HERE? WELCOME

USE COUPON "11OFF" AND GET 11% OFF YOUR ORDERS