Menu Close

Risk Mitigation

Risk is the likelihood of loss, damage, theft or compromise of critical assets of any form.

Senior management must evaluate and make high-level risk mitigating decisions on issues that cross traditional organization boundaries.

A major challenge to a comprehensive mitigation strategy is identifying relevant threats and vulnerabilities from:

world map overlaid with zeros and ones with person and bolded HACKED in red


  • Hacking for Information & Espionage
  • Hacking for Ransom
  • Hacking for Revenge or Ego
  • Hacking to Disrupt or Damage for a Cause
Insider Threat showing remote payoff of insider by outsider with arm through computer monitor


  • Criminal Theft of Assets and Trade Secrets
  • Malicious Insiders for Profit or Revenge
  • Workplace Violence
  • Riots and Violent Protests
Corona Virus image in red representing the natural events and disasters creating risk to be managed


  • Pandemics
  • Floods
  • Hurricanes
  • Earthquakes
  • Tornadoes
  • Tsunamis

A common risk assessment framework enables senior management to make informed decisions involving risk in the context of current and future priorities, finite resources and global complexity.

The cycle of standard Risk Management Assessment (RMA) activities is illustrated below.

Risk Cycle to be Managed  create - train - assess - refine which repeats

Risk Management Assessment (RMA) is a dynamic, iterative and harmonized set of processes for managing and assessing risk. Ideally it is consistent across various organizational elements since what one organization may evaluate as a high risk, another may identify as low risk because each used different criteria. The set of processes enable the identification and analysis of critical information and assets and to identify and consider their vulnerabilities and the current and potential threats facing them.

We Offer Training and Consulting in:

  • Insider Threat Program Evaluation  – Recommendations on Risks to Asset Value
  • NIST Risk Management Framework
  • NISPOM Tailored Security Plans – Based on Risk to Assets Plus Insider Threat
  • Tailored Courses on Various Dimensions of Risk and Risk Standards & Guidelines