Run impact assessments of company systems per usage, employee access, cyber posture, & data sensitivity
Click here to get started with your Data Inventory.
To get started with Business Impact Assessments, be sure to add data sources to your Data Inventory. You can access business impact assessments on the lefthand toolbar of your portal, under the "Compliance" tab.
Business Impact Assessments will not be available until the relevant data per system is completed. To add this information, click on each data source and complete the fields in the source's "General" component.
After completing a system's usage details, you can send the information for review to an owner.
After adding usage data to company systems, the "Estimated impact" column will display a data-driven risk analysis of each system to identify critical business functions and define associated risks.
There are four business impact assessments:
- Usage vs. employees
- Employees vs. data sensitivity
- Employees vs. cyber posture
- Cyber posture vs. data sensitivity
The business impact assessments will will help to determine systems that are not critical to business operations, discover nonessential employee access, and suggest improved security for higher-risk systems.
If you have questions about Business Impact Assessments, talk to us at email@example.com, and we'll be happy to help!🙂