From the course: ISACA Certified in Risk and Information Systems Control (CRISC) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

IT risk scenarios

IT risk scenarios

- [Instructor] Now that we have information on the threats, the vulnerabilities, the impacts, the assets, we want to start building out IT risk scenarios. And these are as simple as a story. They should have attributes of a good story, like only details that are necessary, only details that matter, only things that are present that can help to drive the story forward. But by building out these risk scenarios, we can help get buy-in from stakeholders and better help people visualize the risk. In terms of times when risk scenarios are helpful and worth diving into this level of detail, it might be that you're looking for some sort of funding or resource inject related to controls or protections that you want to put in place. Maybe you need someone to manage your vulnerability program. You don't currently have that role, or someone's doing it more part-time than as a full-time job, and you want to come up with these scenarios…

Contents