Project 2: Risk Assessment Start Here Organizations must stay up-to-date on their vulnerabilities and protection measures. Once vulnerabilities have been evaluated, the organization uses this informat
Prioritized Risks and Response MatrixIn this step, you will add a final column to your existing threat/asset table that demonstrates a potential response to a breach. In addition, add a column showing prioritization of these responses.
Asset | Threat | Risk | Probability | Mitigation Strategies | Potential Response | Prioritization of Responses |
Note: You can add more rows to the bottom of the table if needed.