DELIVERABLESVulnerable Asset List - Submit the completed list of vulnerable assets Internal and External Threats List - submit the itemized list of threats External Inputs of Threats and Vulnerabiliti
Project 2: Risk Assessment Summary Report TemplateYour CIO, Maria Sosa, has asked you to write a "what if" report outlining risks and responses.
Final Risk Assessment Summary Report (five- to seven-page report using this template: Step 13) This report should include the following components:
Title Page
Include:
for whom you are preparing the document, the title, the date prepared, and your name as the preparer of the document
Executive Summary
Include:
the purpose of the report, intended audience, and an explanation of the importance of risk assessment
relevant external/environmental factors (from Step 6)
Prioritized Risks and Response Matrix (table from Step 8: Use Template from Discussion Area)
Include introductory text prior to the matrix
Recommended Risk Management Strategies and Technologies (one- to two-page narrative, from Step 10) This is a discussion of strategies and/or technologies that could be used
Include:
An in-depth discussion of your Prioritized Risks and Response Matrix discussing each of the possible Risk Response Strategies for each vulnerability
the consideration of relevant compliance issues
Risk Management Implementation Recommendations (two- to three-page narrative) This is a discussion of your actual recommendations and why they were chosen and is based upon your research in the previous section.