IT Examiner School - Oct 2025
Internal Use Only
Risk Assessment: The Process
Assess sufficiency of risk control policies, procedures, information systems, etc.
Identify potential internal/external threats and/or vulnerabilities
Assess likelihood & impact of threats/vulnerabilitie s
Risk Response (Accept, Transfer, Reduce, Ignore)
Identify and value information assets
25
These materials are for internal training purposes for NYS DFS Staff. It may not be distributed outside the department.
Internal Use Only
What Are Risk Assessments
What it is...
What it is not….
A process to identify, analyze, and prioritize risks to business operations and information assets.
A one-time project; it is an ongoing process that evolves with the threat landscape.
A way to understand the potential impact of risks and determine the necessary controls to mitigate them.
A replacement for regular security controls or monitoring; it highlights risks but doesn’t fix them.
A mechanism to align security investments with business risk.
A guarantee of security; it’s an analysis tool, not a security solution.
A compliance requirement for many regulatory bodies, and basis for any Security framework.
Solely a checklist exercise; it requires analysis, strategy, and action.
A driver for improved risk communication across teams and stakeholders.
Independent of business objectives; it is directly tied to business continuity and data protection.
Made with FlippingBook Learn more on our blog