CMGT/559 v1 Title ABC/123 vX Page 2 of 2 Risk Register Instructions

CMGT/559 v1
Title
ABC/123 vX
Page 2 of 2
Risk Register
Instructions
Complete the risk register template by identifying the top 5 healthcare information security threats and attack methods related to pandemics, which should be based on research from at least 2 peer-reviewed journal articles.
Note: Include this table in your narrative
Risk 1:
Risk 2:
Risk 3: 
Risk 4:  
Risk 5:  
Risk Rank 
Risk Description 
Source, Threat or Risk driver 
Likelihood 
Organization Impact  
Risk Response 
Owner 
Opportunity 
Key Risk Indicators 
References
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.