DELIVERABLESVulnerable Asset List - Submit the completed list of vulnerable assets Internal and External Threats List - submit the itemized list of threats External Inputs of Threats and Vulnerabiliti

Project 2: Risk Assessment Summary Report Template

Your CIO, Maria Sosa, has asked you to write a "what if" report outlining risks and responses.

Final Risk Assessment Summary Report (five- to seven-page report using this template: Step 13) This report should include the following components:

  • Title Page

    • Include:

      • for whom you are preparing the document, the title, the date prepared, and your name as the preparer of the document

  • Executive Summary

    • Include:

      • the purpose of the report, intended audience, and an explanation of the importance of risk assessment

      • relevant external/environmental factors (from Step 6)

  • Prioritized Risks and Response Matrix (table from Step 8: Use Template from Discussion Area)

    • Include introductory text prior to the matrix

  • Recommended Risk Management Strategies and Technologies (one- to two-page narrative, from Step 10) This is a discussion of strategies and/or technologies that could be used

    • Include:

      • An in-depth discussion of your Prioritized Risks and Response Matrix discussing each of the possible Risk Response Strategies for each vulnerability

      • the consideration of relevant compliance issues

  • Risk Management Implementation Recommendations (two- to three-page narrative) This is a discussion of your actual recommendations and why they were chosen and is based upon your research in the previous section.