[ad_1]
Risk Register
Instructions
Complete the risk register template by identifying the top 5 healthcare information security threats and attack methods related to pandemics, which should be based on research from at least 2 peer-reviewed journal articles.
Note: Include this table in your narrative
Risk 1: | Risk 2: | Risk 3: | Risk 4: | Risk 5: | |
Risk Rank | |||||
Risk Description | |||||
Source, Threat or Risk driver | |||||
Likelihood | |||||
Organization Impact | |||||
Risk Response | |||||
Owner | |||||
Opportunity | |||||
Key Risk Indicators |
References
[ad_2]
CMT/559 WK 1