0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
ID.RA-6: Risk Assessment
Impact, Threats, Vulnerabilities, Risk, Response Jeremy Pickett 11/4/24 Impact, Threats, Vulnerabilities, Risk, Response Jeremy Pickett 11/4/24

ID.RA-6: Risk Assessment

Risk responses are identified and prioritized.

Read More
ID.RA-5: Risk Assessment
Impact, Threats, Vulnerabilities Jeremy Pickett 11/1/24 Impact, Threats, Vulnerabilities Jeremy Pickett 11/1/24

ID.RA-5: Risk Assessment

Threats, vulnerabilities, likelihoods, and impacts are used to determine risk.

Read More
ID.RA-4: Risk Assessment
Business, Risk, Impact Jeremy Pickett 10/31/24 Business, Risk, Impact Jeremy Pickett 10/31/24

ID.RA-4: Risk Assessment

Potential business impacts and likelihoods are identified.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC