The steps cover identifying, locating and clarifying information assets; conducting a threat modeling exercise; and finalizing data and starting planning.
These steps result in a four-level numerical scoring of risk thresholds, enabling an organization to prioritize the addressing of specific threats. "The goal of the risk assessment exercise is to lay a foundation for sensible security planning," according to the Vernon Hills, Ill.-based company.
To access the guide, click here.
This article can also be found at InsuranceNetworking.com.
Joseph Goedert is news editor at Health Data Management.