Identify security threats, determine risks and vulnerabilities which effect the IT organization or that IT can affect, and recommend mitigating changes based on this analysis.
©Copyright IBM Corp. 2005, 2008. All Rights Reserved.