56
results found in
3 ms
Page 1
of 6
Risk-case lack of systemic risk assessments
Resulting in deficencies in all areas of Information Security
Full description
Resulting in deficencies in all areas of Information Security
Full description
Risk-case non-compliance with national legislation
Resulting in flaws in personal data protection and IT management
Full description
Resulting in flaws in personal data protection and IT management
Full description
Risk-case no cost assessments nor transparent data
Resulting in cost-benefit calculatiaon impossible
Full description
Resulting in cost-benefit calculatiaon impossible
Full description
Risk-case lack of non-disclosure agreements and inspections
Resulting in HR caused information security breaches
Full description
Resulting in HR caused information security breaches
Full description
Risk-case Lack of strategic plan
Resulting in Unidentified key costs and benefits of investments
Full description
Resulting in Unidentified key costs and benefits of investments
Full description
Risk-case Unidentified key costs and benefits of investments
Resulting in Limitation in performance, usability and integrity of data
Full description
Resulting in Limitation in performance, usability and integrity of data
Full description
Risk-case inadequate communication structure
Resulting in IS overhauled the infrastructure
Full description
Resulting in IS overhauled the infrastructure
Full description
Risk-case changes and inflexibility at the same time
Resulting in delays and additional costs
Full description
Resulting in delays and additional costs
Full description
Risk-case setup of new information systems was not centrally managed
Resulting in accumulation of information systems
Full description
Resulting in accumulation of information systems
Full description