Use this form to assess, prioritize, and address potential risks to your IT systems and data security.
Enter department responsible for assessment.
Specify the system, software, or process being evaluated.
Describe potential threats (e.g., cyberattack, data breach, hardware failure).
Rate how likely the risk is to occur.
Low
Medium
High
Assess the potential damage if the risk materializes.
Low
Medium
High
Determine overall risk level based on likelihood and impact.
Low
Medium
High
List any existing measures to manage or mitigate the risk.
Outline further steps needed to reduce the risk.
Set deadlines for completing additional measures.
Templates
Templates