In this chapter, you will:
• Learn how to identify potential threats and vulnerabilities
• Understand the different business initiatives and processes that create risk
• Analyze how threats and vulnerabilities factor into different aspects of enterprise risk, including areas such as data management, third-party relationships, the systems development life cycle, project management, business continuity and disaster recovery, IT operations management, and implementation of new technologies
This chapter covers the second part of the first Certified in Risk and Information Systems Control (CRISC) domain and focuses on threats and vulnerabilities associated with different aspects of the enterprise. ...