Tagged - risk identification

Build an IT Risk Management Program

Managing risk has never been more important. Ensure that your organization has an established and manageable way of governing a process related to identifying, assessing,...
  • guided implementation icon

Build an IT Risk Management Program – Phases 1-3

Managing risk has never been more important. Ensure that your organization has an established and manageable way of governing a process related to identifying, assessing,...

Webinar: Build an IT Risk Management Program

COVID-19 highlighted the importance of having an adaptive risk approach where risk intelligence is embedded across the organization. Gaps exposed by the pandemic showed...

Academy: Risk Management | Executive Brief

Topic Introduction

Academy: Risk Management | Phase One

Review IT Risk Fundamentals and Governance

Academy: Risk Management | Phase Two

Identify and Assess IT Risk

Academy: Risk Management | Phase Three

Monitor, Communicate, and Respond to IT Risk

Risk Management Program Manual

Formalizing a risk management program requires creating repeatable and iterative processes, and documenting best practices. Create a comprehensive manual to serve as the...

Risk Costing Tool

It’s impossible to make intelligent decisions about risks without knowing what they’re worth. Use Info-Tech’s Risk Costing Tool to calculate the expected cost of IT’s...

Risk Event Action Plan

Integrate IT risk management with business risk management by creating a paper trail for key risks.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us