[ad_1]
Risk Register
Instructions
Complete the risk register template by identifying the top 5 healthcare information security threats and attack methods related to pandemics, which should be based on research from at least 2 peer-reviewed journal articles.
Note: Include this table in your narrative
| Risk 1: | Risk 2: | Risk 3: | Risk 4: | Risk 5: | |
| Risk Rank | |||||
| Risk Description | |||||
| Source, Threat or Risk driver | |||||
| Likelihood | |||||
| Organization Impact | |||||
| Risk Response | |||||
| Owner | |||||
| Opportunity | |||||
| Key Risk Indicators |
References
[ad_2]
CMT/559 WK 1


