Three Steps to Creating a Simple IT Risk Register
Gartner Analyst Jeffrey Wheatman, asserts that “a risk register is critical to successful risk management”, but also points out that “security and risk management leaders struggle to create a risk register that does not require huge money and time investments and resonates with business stakeholders.” At Coalfire, we have noticed the same thing, so we are doing something about it: we have licensed the Gartner research note to provide you a complimentary copy.
In the report, you’ll get expert analysis of the challenges leaders faces in creating risk registers and a practical, three-step approach to overcome them.
Step 1: Compile a Preliminary Set of Risks
The Gartner document is available upon request from Coalfire. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a purpose.
Step 2: Aggregate and Normalize
Step 3: Share the Risk
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.