- Get raw info from people in crucial information flow areas.
- Get beyond surface concerns, and get to the real worries.
- Analyze information for gaps and inconsistencies,
- Determine where weakest links are
- Develop potential threats and their impacts list
- Communicate findings with change recommendations
- Focus on most likely threats and risks
No comments:
Post a Comment