Project 2: Risk Assessment Start Here Organizations must stay up-to-date on their vulnerabilities and protection measures. Once vulnerabilities have been evaluated, the organization uses this informat

Prioritized Risks and Response Matrix

In this step, you will add a final column to your existing threat/asset table that demonstrates a potential response to a breach. In addition, add a column showing prioritization of these responses.

Asset

Threat

Risk

Probability

Mitigation Strategies

Potential Response

Prioritization of Responses

Note: You can add more rows to the bottom of the table if needed.