List three types of sensitive information involved with each situation.
Identify three ways each information item could be misused or harmed.
Answer the questions at the end of the table.
What is the most effective way to identify risks like those you noted in the tables?
What are some important factors when weighing the depth of a formal risk analysis?
How would you balance the interruption needed for depth and the need to continue ongoing organizational activity?
What should an organization’s risk management specialist do with the information once a potential risk has been identified?
How would this specialist properly prioritize these risks to make sure the most important ones were mitigated first?
Who is responsible for ensuring that an identified risk is addressed by the organization?