Question: For this stepping stone, you will be completing a risk register. Risk registers are classically a project management tool that can be used as a
For this stepping stone, you will be completing a risk register. Risk registers are classically a project management tool that can be used as a decision aid to make informed decisions about risk mitigation strategies. The risk register helps prioritize company resources, which include people, processes, and technology. The goal of completing a risk register is understanding the importance of that data and how to use it to make the best decisions for the organization. There are sometimes acceptable risks that are of high priority but cannot be mitigated. Therefore, they need to be closely monitored and have a proper incident response plan in place to handle the event. A cybersecurity analyst may be part of a team that completes the risk register together. There may be areas of the risk register that are not in the daytoday responsibilities of the cybersecurity analyst but do pose risks to the organization. Completing a risk register requires systems thinking and an awareness of all risks within an organization.
When completing a risk register, the team needs to evaluate what risks will be entered. For the purposes of this stepping stone, you have been provided the risk ID and risk description. This identification is typically measured by the triggering event and the possible loss of revenue to the company. There is a neverending list of risks that can be applied to an organization, but the risk register should include risks that have the greatest possibility of the loss of assets. The risk register is a helpful input when evaluating recovery time objectives RTO and recovery point objectives RPO You will examine this in more detail in Project One Stepping Stone Two when you perform a business impact analysis BIA
The stepping stone prepares you for Project One, due in Module Six.
Scenario
You are part of a cybersecurity consultant firm that has been hired to help Green Thumb Nursery develop its risk management plan. The initial round of onsite, inperson interviews has already been conducted by your leadership team, and you are tasked with helping the team complete the finalized risk register documentation. Use the notes from the inperson interview, which is linked in the Project One Stepping Stone One assignment in Module Two, to help inform your work.
Prompt
Complete the risk register template, which is linked in the Project One Stepping Stone One assignment in Module Two of your course, and the Rationale section of the prompt below.
You must address the critical elements listed below:
Risk Register
Accurately complete the Ordering Supplies Risk ID row in the risk register.
Accurately complete the Technology Risk ID row in the risk register.
Accurately complete the Physical Security Risk ID row in the risk register.
Accurately complete the Asset Management Risk ID row in the risk register.
Accurately complete the Insurance Risk ID row in the risk register.
Accurately complete the Safety Risk ID row in the risk register.
Rationale: For this section, you will identify two risk IDs of your choice and justify your decisionmaking process while filling out the template. Provide a minimum of words per risk ID
Identify a risk ID of your choice and justify your inputs to the risk register.
Identify a risk ID of your choice and justify your inputs to the risk register.
What to Submit
You will submit two files: your risk register template and your rationale, which should be a Word document to pages in length. Use double spacing, point Times New Roman font, and oneinch margins. Any references should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your namefor example, CYBAssignmentFirstnameLastname.docx.Green Thumb Business Operations Interview Notes
Interviewee: Business Owner Kim
Understanding the Business
Understanding the Processes and Priority
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
