26
results found in
3 ms
Page 1
of 3
Risk-case confidential personal data are not sufficiently protected
Resulting in abuse of data
Full description
Resulting in abuse of data
Full description
Risk-case lack of regulations concerning the protection of confidential data on a group of entities
Resulting in information leaks
Full description
Resulting in information leaks
Full description
Risk-case list of controls to mitigate risks
Resulting in more consistent effects and easier evaluation
Full description
Resulting in more consistent effects and easier evaluation
Full description
Risk-case mandatory strategies implemented incompletely
Resulting in lower level of information security
Full description
Resulting in lower level of information security
Full description
Risk-case "no change" strategy
Resulting in exposure of the organisation to many risks, which must be understood and managed
Full description
Resulting in exposure of the organisation to many risks, which must be understood and managed
Full description
Risk-case "enhance and maintain" strategy
Resulting in response to changing business needs and reduced risk of disruption
Full description
Resulting in response to changing business needs and reduced risk of disruption
Full description
Risk-case "replace" strategy
Resulting in successful replacement of core legacy ICT
Full description
Resulting in successful replacement of core legacy ICT
Full description
Risk-case data handover-takover not regulated properly
Resulting in errors left not corrected
Full description
Resulting in errors left not corrected
Full description