Classify business risks as they relate to information gathered in Module 01 - 05.
Identify three Security Controls.
Evaluate security control effectiveness for each risk mitigation.
Identify who, if anybody, should be in charge of an organization's conduct.
Identify regulating ethical standards and who should watch over the regulators and define information system risks.
Identify the key components needed to create a risk management continuous monitoring plan.
Finally, your plan will provide your proposals for providing Continuous Assessment, Continuous Reporting, and Continuous Authorization.
Sample Solution