Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
13 results found in 4 ms Page 1 of 2
Risk-case list of controls to mitigate risks
Resulting in more consistent effects and easier evaluation
 
Full description
Risk-case mandatory strategies implemented incompletely
Resulting in lower level of information security
 
Full description
Risk-case lack of periodic assessment and review
Resulting in weaker assurance
 
Full description
Risk-case poor information architecture
Resulting in higher cost of data processing
 
Full description
Risk-case shortcomings in the security management
Resulting in breach of information availability, confidentiality, integrity
 
Full description
Risk-case insufficient business continuity arrangments
Resulting in breakdown of the information system
 
Full description
Risk-case poor automation of personal data processing
Resulting in insufficient compliance with the law
 
Full description
Risk-case fragmented responsibilities
Resulting in limited focus on effectiveness
 
Full description
Risk-case overlapping strategies
Resulting in difficulties in review and reporting
 
Full description
Risk-case unclear progress in implementing the major strategy
Resulting in
 
Full description
13 results found. Page 1 of 2 next