Wednesday, August 26, 2009

Audit Vulnerability

  • Get raw info from people in crucial information flow areas.
  • Get beyond surface concerns, and get to the real worries.
  • Analyze information for gaps and inconsistencies,
  • Determine where weakest links are
  • Develop potential threats and their impacts list
  • Communicate findings with change recommendations
  • Focus on most likely threats and risks

No comments: