Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

IT risks management

No description
by

Nouf saad

on 12 October 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of IT risks management

IT RISKS MANAGEMENT
Outline:
Definition
Examples
Challenges
products
Introduction:
Nouf Alismaile 431000345
Mashael AlHaqbani 431000515
Risk
Examples Of Risks
likelihood
Occur
impact
Each risk have:
analyze risk
Quantitative
Qualitative
Time
Cost
Performance
If your business relies on information technology (IT) systems such as computers and networks for key business activities you need to be aware of the range and nature of risks to those systems.
IT Risk Management
Managing information technology (IT) risks is a structured process that involves a series of activities designed to:
identify risks
assess risks
mitigate risks
develop response plans
review risk management procedures
Examples
Data center
products:
IT GRC Software Solution
Anti-Virus
IBM Risk Management solutions
Challenges:
Lack of awareness in risk management
The rapid changes in technology its highly affect the IT risk management
The poor planning of IT risk management
Conclusion
Risk can't be
eliminated
but they can be controlled
The important of IT risk management in our life
The sequences of IT risk management
Opportunity
Threat
Threats

Opportunities
Avoid
Transfer
Mitigate
Accept
Exploit
Share
Enhance
Accept
one the best practices in IT risk management is to
integrate
risk management into the systems development life cycle.
Questions

?
Full transcript