Using the information submitted from Identify Threats and the experience of operating IT, all potential future threats
should be identified as well so that planning can begin to mitigate prior to the threat realization. Once threats are
identified, every threat should be associated with a risk. Risk will detail the ramifications or impact on the
organization should a threat be realized within the environment. Parallel to risk assessment, the discovery of
vulnerabilities should begin. Vulnerabilities will detail structure within the IT organization that lends itself to the
probability of a threat being realized.
|