This series of guides aims to help security professionals through the process of conducting a Risk Assessment that comes with free, downloadable worksheets. You can also check out corresponding videos on our YouTube channel if you want to learn more.
Establishing context: security policy
In the fourth video of the series we identify the key elements of your organization’s security policy that should be used as inputs into your Risk Assessments
This worksheet accompanies the fourth video in the risk assessment series and provides further detail about how to use the information from your security policy.
Establishing context: stakeholder analysis
In the third video of the series we walk through a systematic approach to identifying and categorising stakeholders, to then determine how much involvement they should have in the Risk Assessment process.
This worksheet accompanies the third video in our risk assessment series, and provides a template of the stakeholder analysis model to use for your Risk Assessment.
Establishing context: business strategy
In the second video of our Risk Assessment series, we show you some tips for understanding our broader organization’s strategy, as part of establishing the context for your Risk Assessments.
This worksheet accompanies the second video in our Risk Assessment series, and provides questions and templates to guide business strategy analysis.
Purpose and scope of a risk assessment
In the first video of our Risk Assessment series, we cover the purpose of a risk assessment, and an overview of what should be included.
This worksheet accompanies the first video in our Risk Assessment series, and provides information on what a Risk Assessment should cover.
All the help you need
We have gathered all resourcful information, tips and tricks to make you up and running with our software in no time