Information Security Risk Analysis

The latest feature of t-method software’s System Design module allows to perform information security risk analysis in accordance with the regulations.

  • When conducting the risk analysis, we follow the classic process-oriented approach.
  • We can identify the risks associated with each process in our management system.
  • It is possible to predefine the colors to indicate different risk levels, allowing us to get an immadiate overview of the process status.
  • Where necessary, we can define actions and track their implementation status in a separate list.

To conduct a comprehensive risk analysis, we can fill up a list of devices that store data important from an information security point of view. For each device, we can specify the types of data it handles. We can record all the characteristics of the data (data packages) required by the standard on their data sheet.

The identified information security risks can be displayed both by process and summerized. The analysis, which can also be managed as part of the general risk analysis recorded in the management system, can be versioned and embedded into the management system manual created in the t-method.

Scroll to Top