What is a risk assessment?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Once a business impact analysis (BIA) has been completed, you will have an excellent view of how your organization operates, what it needs to operate, and how quickly critical systems and data must be recovered for the business unit to resume normal operations. It’s also important to identify external and internal risks and threats to the operational issues identified in the BIA.
Conduct a risk assessment to identify situations that may produce disruptive events to your organization. For example, an internal threat may be the potential for an employee to damage a server, corrupt a critical application, or shut down power to critical systems. External threats can range from severe weather to earthquakes, unauthorized entry into your building, or vandalism.
The risk assessment not only identifies the external and internal risks and threats, it can also identify your organization's vulnerabilities. Analyzing each threat for likelihood of occurrence and potential damage rendered will help you pinpoint specific threat conditions you will address in your disaster recovery plans. Combine this risk data with BIA results and you will be able to zero in on those business functions that are at the greatest risk and represent the greatest potential loss to the organization.
Related Q&A from Paul Kirvan
Your organization's risk assessment plan should account for the increase in severe weather events and the damage they can cause.continue reading
Developing a business disaster recovery plan requires buy-in from management as well as the building landlord.continue reading
Many backup software products now include WAN optimization techniques, but will users be quick to give up hardware-based WAN optimization?continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.