In the fourth video of the Risk Assessment series we identify the key elements of your organization’s security policy that should be used as inputs into your Risk Assessments.
Downloadable Worksheet
Download the supporting materials below for further detail about how to use the information from your security policy.