Risk Assessment

Features

Organizations must be conscious of information security, and must develop and implement proper security controls based on their internal risk and vulnerability assessments. These assessments can help the organization:

  • Uncover known weaknesses and vulnerabilities in its IT infrastructure.
  • Prioritize the impact of these vulnerabilities, based on the value and importance of the IT and data assets affected.
  • Implement security controls and countermeasures to mitigate the weaknesses.

The mitigation increases security, and reduces the odds that a threat or vulnerability will harm the organization’s production environment.

Getting started

Every project reviewed through the University’s governance process will undergo a risk assessment by the Security Team. Before the University will allow software purchases (including Mobile Apps), those software must be assessed for risk. Contact the Technology Service Desk at 940-898-3971servicedesk@twu.edu, techchat.twu.edu, submit a request through the Technology Service Catalog, or submit a request by clicking Request Service on this page.

Related services

Quotes
Software Assessment and Implementation

Links List