Lect 11
Lect 11
http://fpt.edu.vn 05/11/202 2
4
Review the Risk Assessment
for Your IT Infrastructure
http://fpt.edu.vn 05/11/202 3
4
Review the Risk Assessment for
Your IT Infrastructure (cont.)
• In-place countermeasures
• Planned countermeasures
• Approved countermeasures
http://fpt.edu.vn 05/11/202 4
4
Review the Risk Assessment for
Your IT Infrastructure (cont.)
• Overlapping countermeasures
• Matching threats with vulnerabilities
• Identifying countermeasures
http://fpt.edu.vn 05/11/202 5
4
Translating Your Risk Assessment
into a Risk Mitigation Plan
http://fpt.edu.vn 05/11/202 6
4
Prioritizing Risk Elements That
Require Risk Mitigation
http://fpt.edu.vn 05/11/202 7
4
Prioritizing Risk Elements That
Require Risk Mitigation
• Prioritizing Countermeasures
http://fpt.edu.vn 05/11/202 8
4
Verifying Risk Elements and How
These Risks Can Be Mitigated
http://fpt.edu.vn 05/11/202 9
4
Performing a Cost-Benefit Analysis
on the Identified Risk Elements
http://fpt.edu.vn 05/11/202 10
4
Implementing a Risk Mitigation Plan
http://fpt.edu.vn 05/11/202 11
4
Following Up on the Risk Mitigation Plan
http://fpt.edu.vn 05/11/202 12
4
Best Practices for Enabling a Risk Mitigation Plan
from Your Risk Assessment
http://fpt.edu.vn 05/11/202 13
4