26
    results found in
    5 ms
  
  Page 1
    of 3
   
Risk-case confidential personal data are not sufficiently protected    
Resulting in abuse of data
 
Full description
    
Resulting in abuse of data
Full description
Risk-case lack of regulations concerning the protection of confidential data on a group of entities    
Resulting in information leaks
 
Full description
    
Resulting in information leaks
Full description
Risk-case list of controls to mitigate risks    
Resulting in more consistent effects and easier evaluation
 
Full description
    
Resulting in more consistent effects and easier evaluation
Full description
Risk-case mandatory strategies implemented incompletely    
Resulting in lower level of information security
 
Full description
    
Resulting in lower level of information security
Full description
Risk-case "no change" strategy    
Resulting in exposure of the organisation to many risks, which must be understood and managed
 
Full description
    
Resulting in exposure of the organisation to many risks, which must be understood and managed
Full description
Risk-case "enhance and maintain" strategy    
Resulting in response to changing business needs and reduced risk of disruption
 
Full description
    
Resulting in response to changing business needs and reduced risk of disruption
Full description
Risk-case "replace" strategy    
Resulting in successful replacement of core legacy ICT
 
Full description
    
Resulting in successful replacement of core legacy ICT
Full description
Risk-case data handover-takover not regulated properly    
Resulting in errors left not corrected
 
Full description
    
Resulting in errors left not corrected
Full description
