Risk Assessment is a process that involves the identification, analysis, and evaluation of all possible risks, hazards, and threats to an entity’s external and internal environment. The process will also look into the entity’s vulnerabilities to weather-related threats, hazards from its local area, HVAC failure, and potential weaknesses within/internal and without/external the organization’s security standards.

In the event, an entity has been exposed to such threats the assessment process will require the organization to document measures taken or to be taken to address the threat issues. Therefore, it is as a result of identifying such risks and looking into possible measures for threats identified that a business can come up with a list of the best measures to improve conditions especially the identifiable local risks.

It is crucial for an entity to identify its possible risks or threats, the possibility of their occurrence, their potential implications, and their vulnerability, to be able to develop preventive and strategic recovery measures. Other advantages in relation to risk identification are as follows:

  1. It will highlight risks or threats that had been previously overlooked and need procedures and plans to address them.
  2. Identifies some of the weaknesses in preventive measures that need to be addressed or reviewed.
  3. Lays emphasis on the significance of contingency planning which leads to the incorporation of all members of staff in the organization.
  4. Assists in the documentation of interdependent relationships between departments hence foster inter-relationships between the internal groups at the same time highlight weaknesses between relationships of sensitive departments.

For the process to be easier all risks have been categorized to enhance concentration on each of them. Therefore, these are the categories that you will find attached to the Risk Assessment survey:

  1. Natural risks
  2. Man-made
  3. Environmental

Identifying Risks / Threats

It is important to establish the nature of each risk and threat regardless of its type of category and factors to consider are as follows though not limited to.

  1. Geographic Location
  2. Weather Patterns for the Area and Surrounding Areas
  3. Internal Hazards (HVAC, Facility Security, Access, etc)
  4. Proximity to Local Response/Support Units
  5. External Hazards (neighboring Highways, Plants, etc)

Potential exposures may be classified as:

  1. Facility Related: Bomb Threat, Chemical Spills, Civil Disturbance, Electrical Failure, Fire, HVAC Failure, Water Leaks, Work Stoppage / Strike
  2. Technology Related: Human Error, Loss of Telecommunications, Data Center Outage, Lost / Corrupted Data, Loss of Local Network Services, Power Failure, Prolonged Technology Outage, UPS / Generator Loss of service.
  3. Weather Related: Earthquake, Flood / Flash Flood, Hurricanes / Tropical Storms, Severe Thunderstorms, Tornado, Winter Storms

Objectives

The purpose of this Risk Assessment Guide document is to assist the business conduct a Risk Assessment, which discovers the present risks and threats to the business and implement procedures to eradicate or decrease those potential risks. This document endows with guidance on how to conduct the Risk Assessment, evaluate the information that is assembled, and put into practice strategies that will permit the business to manage the risk. The following documents are available to help the business complete the assessment:

  1. Risk Assessment Template
  2. Risk Assessment Worksheet
  3. Facility RA Findings Report
  4. Executive RA Findings Report
  5. Examples of Preventative Measures

The Risk Assessment is merely part one of an overall Business Assessment. A Business Assessment is alienated into two constituents, Risk Assessment and Business Impact Analysis (BIA). The Risk Assessment is intended to evaluate current vulnerabilities to the business’s environment, while the Business Impact Analysis evaluates probable loss that could result during a disaster. To maximize the Risk Assessment, a Business Impact Analysis should also be completed.

Table of Contents of Conducting a Risk Assessment

INTRODUCTION

Compliance
Scope

RISK ASSESSMENT

Objectives of the Risk Assessment
Risk Assessment Process
What Should Be Included?
Steps to Follow

ASSESSING YOUR RISK

Identifying Risks / Threats
Probability of Occurrence
Vulnerability to Risk
Potential Impact
Preventative Measures in Place
Insurance Coverage
Past Experiences

ANALYZING THE RESULTS

Review Interview Notes
Follow-Up Meetings
Report the Results

FINAL REPORT & PRESENTATION

Creation of Executive Report
Presenting the Results
Next Steps
Conclusion

KEYS FOR SUCCESS

Senior Management Support
Effective Data Gathering Tools
Key Resources
Critical Data
Executive Report

APPENDIX ITEMS

Appendix A: Risk Assessment Survey
Appendix B: Risk Assessment Worksheet
Appendix C: Facility Risk Assessment Report
Appendix D: Executive Risk Assessment Report
Appendix E: Examples of Preventative Measures

Objective

Due to many regulatory compliance rule regulations, your organization must implement Business Resumption Plan, Business Continuity Plan, and Business Analysis Plan to ensure the protection of data. In order to carry out this undertaking, there are numerous steps that your organization will be carried out to detect critical business functions, processes, and applications that process vital data and to understand the potential impact to the business if a disruptive event occurred.

One of the first steps of implementing the Business Resumption Plan for your organization is to conduct a Risk Assessment (RA). This questionnaire will assist you to detect the present risks and threats to the business and put into practice measures to eradicate or lessen those potential risks. Once the survey is completed, the RA Project team will examine the data and create prioritized risk reduction (mitigation) strategies to present to senior management.

Table of Contents of Risk Assessment Template

OBJECTIVE

GENERAL INFORMATION

Respondent Information
Company Information

PREVIOUS DISRUPTIONS

Facility Related
Technology Related
Weather Related

NATURAL & MAN-MADE RISKS & THREATS

Natural Risks / Threats
Man-Made Risks / Threats

ENVIRONMENT & FACILITY RISKS

Environment Risks / Threats
Facility Risks / Threat

PREVENTATIVE MEASURES

Hazardous Materials
Fire Containment
Emergency Notification, Evacuations, Alarms & Exits
Facility Features, Security, & Access
HVAC
Utilities
Data Center (Technologies)

The following list contains examples of preventative measures that can be put into practice by the company to alleviate the potential risks that at present exist. Some of these activities may be achieved easily, as to where some may take more time and more resources.

Natural Risks

The natural risks are typically linked with weather related events: flooding, high winds, severe storms, tornado, hurricane, fire, high winds, snowstorms, and ice storms.

Risk / Threat

Preventative Measures

Earthquakes
  1. Move large and heavy objects to the fall to prevent injury (from falling on people.)
  2. Equipment tie-downs are used on all critical computer equipment.
  3. Emergency power is available on-site.
  4. Earthquake construction guidelines have been adhered to so that damage can be minimized.
  5. Critical data and vital records should be backed up and sent offsite for storage.
  6. Staff should be trained in Earthquake evacuations and safety.

Man-Made Risks

The man-made risks are typically linked with the man-made type of events: Bomb threats, vandalism, terrorism, civil disorder, sabotage, hazardous waste, work stoppage (internal/external), and computer crime.

Risk / Threat

Preventative Measures

Staff Productivity Risks
  1. Alternate sources of trained employees have been identified
  2. Proper training and necessary cross-training are conducted
  3. Files are backed up and procedures are documented
  4. The work areas are comfortable and safe

 

Environmental Risks

The environmental risks are typically linked with exposures from surrounding facilities, businesses, government agencies, etc.

Risk / Threat

Preventative Measures

Hazardous Materials Plant
  1. There is a nightly backup of data processing electronic record and that backup is stored off-site
  2. The off-site backup facility is a sufficient distance away from this facility
  3. An alternate site has been identified for use in the event that this facility is unusable
Address of Location:
Participant: Date of Report:

The interview was conducted by on .

Overview of Facility Business Operations

The is responsible for

Previous Disruption Experiences

Risks & Vulnerabilities

Natural Risks

The Natural risks are typically linked with weather related events: flooding, high winds, severe storms, tornado, hurricane, fire, high winds, snow storms, and ice storms. In each RA Survey, the facilities manager was asked to identify potential natural risks and rate the severity of each.

 

Summary of Natural Risks

For the location of this facility and historical weather patterns, it has been stated that pose the biggest threat.

How the risk ranking was determined: Overall Risk = Probability * Severity (Magnitude – Mitigation)

Threat

Probability

Magnitude

Mitigation

Overall Risk

Drought
Earthquake
Fire
Flood / Flash Flooding
Hurricane / Tropical Storm
Ice Storms
Landslides
Severe Thunderstorms
Tornado
Wildfire

Objective

The Risk Assessment (RA) Policy document establishes the activities that require being carried out by each Business Unit, Technology Unit, and Corporate Units (departments) within the organization.

All departments must use this methodology to detect present risks and threats to the business and put into practice measures to eradicate or decrease those potential risks.

Table of Contents for Risk Assessment Policy

TERMINOLOGY
ACCOUNTABILITY
COMPLIANCE
REVISION HISTORY
ENDORSEMENT

I. POLICY OVERVIEW

A. Purpose
B. Scope
C. Ownership Roles & Responsibilities
D. Review Process
E. Reporting Process
F. Update Frequency and Annual Review
G. Approval

II. RA REQUIREMENTS

A. RA Completion
B. Risks and Threats Identification
C. Probability of Occurrence
D. Vulnerability to Risk
E. Potential Impact of Risk
F. Preventative Measures
G. Insurance Coverage
H. Previous Disruptions

III. RA RESULTS

A. Overall Facility Risk
B. Communication
C. Retention of RA Survey

APPENDIX

Appendix A – Risk Assessment Standards

Objective

The intention of the Application & Data Criticality Analysis is to determine the criticality to covered entity of all application based components and the potential losses which may be incurred if these components were not available for a period of time. This questionnaire is designed to collect the information necessary to support the development of alternative processing strategies, solutions and IS Recovery plans.

The Business Impact Analysis (BIA) should be fulfilled prior to this engagement. The outcome of the BIA should be used to assess technology requirements based on the business needs.

This questionnaire also serves as a compliance method for meeting many regulatory compliance rule requirements for Application & Data Criticality Analysis.

Table of Contents of Applications and Data Criticality Analysis Template

OBJECTIVE

RESPONDENT INFORMATION

APPLICATION INFORMATION

Application Information
Application Specifications
Application Users
Application Service Providers
Application Vulnerability
Application Recovery Complexity
Application Recovery Plan
Application Recovery History
Application Standard Operating Procedures
Application Source Code and Backup Information
Application Dependencies
Application Data Reconstruction

DATABASE INFORMATION

Database Information
Database Service Providers
Database Vulnerability
Database Recovery Complexity
Database Recovery Information
Database Recovery History
Database Standard Operating Procedures
Database Backup Information
Database Backup Tape Information

HARDWARE (SYSTEM) INFORMATION

Hardware Information
Hardware Environment Information
Hardware Service Providers
Hardware Vulnerability
Hardware Recovery Complexity
Hardware Recovery Plan
Hardware Recovery History
Hardware Backup Information
Hardware Backup Tape Information

NETWORK INFORMATION

Network Equipment Requirements
Network Service Providers
Network Vulnerability
Network Recovery Complexity
Network Recovery Plan
Network Recovery History
Network Standard Operating Procedures

Purpose

This Application Recovery Plan documents the strategies, personnel, procedures, and resources necessary to recover the Application following any type of short or long term disruption. The following objectives have been established for this plan:

  1. Maximize the value of business resumption, business impact analysis, and disaster recovery planning by establishing recovery plans that consist of the following phases:
    1. Notification / Activation: To activate the plan and notify vendors, customers, employees, etc of the recovery activities
    2. Recovery Phase: To recovery and resume temporary IT operations on alternate hardware (equipment) and possibly at an alternate location
    3. Restoration Phase: To restore IT systems processing capabilities to normal operations at the primary location or the new location
  1. Define the activities, procedures, and essential resources required to perform processing requirements during prolonged periods of disruption to normal operations.
  2. Allocate responsibilities to designated personnel and provide guidance for recovering during prolong periods of interruption to normal operations.
  3. Make certain coordination with other Staff is conducted.
  4. Ensure coordination with external contacts, like vendors, suppliers, etc. who will participate in the recovery process.

Table of Contents for Applications Recovery Plan Template

PLAN MAINTENANCE

PLAN EXERCISE

PLAN LOCATION

PLAN DISTRIBUTION

PLAN INTRODUCTION

Purpose
Applicability
Scope
Assumptions
Use Of This Plan

APPLICATION PROFILE

Application Specifications
Server Requirements
Database Requirements
Network Requirements
Input (Feeders) Dependencies on Applications / Systems
Output (Receivers) Dependencies on Applications / Systems
Business Processes

PLAN ACTIVATION PROCEDURES 
Plan Activation Team

TEAM MEMBERS & RESPONSIBILITIES

Activate Team Members
Travel to Alternate Location

RECOVERY PROCEDURES

Restore Application Services
File Verification Tasks
Application Validation and Synchronization Tasks
Restoration Procedures
Original or New Site Restoration
Concurrent Processing
Plan Deactivation

APPENDIX

Appendix A: Employee Contact List
Appendix B: Vendor Contact List

Purpose

This Database Disaster Recovery Plan documents the strategies, personnel, procedures, and resources necessary to recover the Database following any type of short or long term disruption. The following objectives have been established for this plan:

  1. Maximize the value of business resumption, business impact analysis, and disaster recovery planning by establishing recovery plans that consist of the following phases:
    1. Notification / Activation: To activate the plan and notify vendors, customers, employees, etc of the recovery activities
    2. Recovery Phase: To recovery and resume temporary IT operations on alternate hardware (equipment) and possibly at an alternate location
    3. Restoration Phase: To restore IT systems processing capabilities to normal operations at the primary location or the new location
  2. Define the activities, procedures, and essential resources required to perform processing requirements during prolonged periods of disruption to normal operations.
  3. Allocate responsibilities to designated personnel and provide guidance for recovering during prolong periods of interruption to normal operations.
  4. Make certain coordination with other Staff is conducted.
  5. Ensure coordination with external contacts, like vendors, suppliers, etc. who will participate in the recovery process.

Table of Contents for Database Recovery Plan Template

CONFIDENTIALITY STATEMENT

PLAN MAINTENANCE

PLAN EXERCISE

PLAN LOCATION

PLAN DISTRIBUTION

PLAN INTRODUCTION

Purpose
Applicability
Scope
Assumptions
Use of This Plan

DATABASE PROFILE

Database Specifications
Server Requirements

PLAN ACTIVATION PROCEDURES

Plan Activation Team

TEAM MEMBERS & RESPONSIBILITIES

Activate Team Members
Travel to Alternate Location

RECOVERY PROCEDURES

Restore Database Services

RESTORATION PROCEDURES

Original or New Site Restoration
Concurrent Processing
Plan Deactivation

APPENDIX

Appendix A: Employee Contact List
Appendix B: Vendor Contact List

Purpose

This Network Recovery Plan documents the strategies, personnel, procedures and resources necessary to recover the network following any type of short or long term disruption. The following objectives have been established for this plan:

  1. Maximize the value of business resumption, business impact analysis, and disaster recovery planning by establishing network recovery plans that consist of the following phases:
    1. Notification / Activation: To activate the plan and notify vendors, customers, employees, etc of the recovery activities
    2. Recovery Phase: To recovery and resume temporary IT operations on alternate hardware (equipment) and possibly at an alternate location
    3. Restoration Phase: To restore IT systems processing capabilities to normal operations at the primary location or the new location
  2. Define the activities, procedures, and essential resources required to perform network recovery during prolonged periods of disruption to normal operations.
  3. Allocate responsibilities to designated personnel and provide guidance for recovering the network during prolong periods of interruption to normal operations.
  4. Make certain coordination with other Staff is conducted.

Ensure coordination with external contacts, like vendors, suppliers, etc. who will participate in the recovery process.

Table of Contents of Network Recovery Plan Template

PLAN MAINTENANCE

PLAN EXERCISE

PLAN LOCATION

PLAN DISTRIBUTION

PLAN INTRODUCTION

Purpose
Applicability
Scope
Assumptions
Use of this Plan

NETWORK PROFILE

Network Specifications
Network Requirements

PLAN ACTIVATION PROCEDURES 
Plan Activation Team

TEAM MEMBERS & RESPONSIBILITIES

Activate Team Members
Travel to Alternate Location

RECOVERY PROCEDURES

Restore Network Services
Restoration Procedures
Original or New Site Restoration
Concurrent Processing
Plan Deactivation

APPENDIX

Appendix A: Employee Contact List
Appendix B: Vendor Contact List
Appendix C: Network Diagrams

This key document contains the non-technical activities that require being done in support of Disaster Recovery operations. The subsequent sections contain contact numbers, contact personnel, activation and notification procedures, an overview of recovery teams, vendor contact information and recovery locations.

The complete technical recovery procedures for all components are located in the appendix given that these disaster recovery plans are modified on a regular basis owing to periodic configuration changes of the company’s Technology Environment. Moreover, with continual changes to the hardware, network, and operating systems (OS), technical documents such as the detailed individual DR Plans for this environment will be updated on a regular basis to make sure modification in hardware and operating systems are reflected in the technical DR Procedures.

Table of Contents for Disaster Recovery Plan

CONFIDENTIALITY STATEMENT

PLAN MAINTENANCE

PLAN EXERCISE

PLAN LOCATION

PLAN DISTRIBUTION

MEDIA POLICY

EXECUTIVE SUMMARY

Definition of A Disaster
Disaster Declaration Criteria

QUICK REFERENCE GUIDE

SCOPE & OBJECTIVES

Scope of This Plan
Objectives of This Plan

RECOVERY STRATEGY

Recovery Strategy
Application & System Recovery
Network Recovery
Telecommunications Recovery
Contractual Agreement for Recovery Services

PLAN ASSUMPTIONS & EXPOSURES

Planning Assumptions
Known Exposures

DISASTER DECLARATION PROCEDURE

Declaration Authority

NOTIFICATION PROCEDURES

Notification & Activation Team

RECOVERY TEAMS

Management Team
Administrative Team
Alternate Site Team
Offsite Storage Team

CONTACT LISTS

Employee Contact Information
Department Notifications
Vendor Notification
Other Emergency Contact Numbers

ALTERNATE LOCATIONS

Assembly Site
Command Center
Recovery Site Information

OFFSITE STORAGE LOCATION

Offsite Storage Information

PLAN CERTIFICATION

Plan Certification

APPENDIX ITEMS

I. Application Technical Recovery
II. Systems Technical Recovery
III. Network Technical Recovery
IV. Telecommunications Technical Recovery
V. Database Technical Recovery
Appendix A – Employee Notification Procedures
Appendix B – Notification Log
Appendix C – Event / Disaster Information
Appendix D – Record Log
Appendix E – Alternate Site Authorization Form
Appendix F – Recovery Status Report
Appendix G – Disaster Recovery Report
Appendix H – Travel Accommodations Request Form
Appendix I – Employee Tracking Form
Appendix J – Assessing Potential Business Impact

Purpose

This Server Recovery Plan documents the strategies, personnel, procedures and resources necessary to recover the Server following any type of short or long term disruption. The following objectives have been established for this plan:

  1. Maximize the value of business resumption, business impact analysis, and disaster recovery planning by establishing server recovery plans that consist of the following phases:
    1. Notification / Activation: To activate the plan and notify vendors, customers, employees, etc of the recovery activities
    2. Recovery Phase: To recovery and resume temporary IT operations on alternate hardware (equipment) and possibly at an alternate location
    3. Restoration Phase: To restore IT systems processing capabilities to normal operations at the primary location or the new location
  2. Define the activities, procedures, and essential resources required to perform processing requirements during prolonged periods of disruption to normal operations.
  3. Allocate responsibilities to designated personnel and provide guidance for recovering during prolong periods of interruption to normal operations.
  4. Make certain coordination with other Staff is conducted.
  5. Ensure coordination with external contacts, like vendors, suppliers, etc. who will participate in the recovery process.

Table of Contents for Server Recovery Plan

CONFIDENTIALITY STATEMENT

PLAN MAINTENANCE

PLAN EXERCISE

PLAN LOCATION

PLAN DISTRIBUTION

PLAN INTRODUCTION

Purpose
Applicability
Scope
Assumptions
Use of this Plan

SERVER PROFILE

Server Specifications
Network Requirements
Applications

PLAN ACTIVATION PROCEDURES 
Plan Activation Team

TEAM MEMBERS & RESPONSIBILITIES

Activate Team Members
Travel to Alternate Location

RECOVERY PROCEDURES

Restore Server Services

RESTORATION PROCEDURES

Original or New Site Restoration
Concurrent Processing
Plan Deactivation

APPENDIX

Appendix A: Employee Contact List
Appendix B: Vendor Contact List

Overview:

Telecommunications Recovery Plan documents the strategies, personnel, procedures and resources necessary to recover company’s Telecommunications following any type of short or long term disruption. The following objectives have been established for this plan:

  1. Maximize the value of business resumption, business impact analysis, and disaster recovery planning by establishing telecommunications recovery plans that consist of the following phases:
    1. Notification / Activation: To activate the plan and notify vendors, customers, employees, etc of the recovery activities
    2. Recovery Phase: To recovery and resume temporary IT operations on alternate hardware (equipment) and possibly at an alternate location
    3. Restoration Phase: To restore IT systems processing capabilities to normal operations at the primary location or the new location
  2. Define the activities, procedures, and essential resources required to perform network recovery during prolonged periods of disruption to normal operations.
  3. Allocate responsibilities to designated personnel and provide guidance for recovering the network during prolong periods of interruption to normal operations.
  4. Make certain coordination with other staff is conducted.
  5. Ensure coordination with external contacts, like vendors, suppliers, etc. who will participate in the recovery process.

Table of Contents for Telecommunications Recovery Plan Template

CONFIDENTIALITY STATEMENT

PLAN MAINTENANCE

PLAN EXERCISE

PLAN LOCATION

PLAN DISTRIBUTION

PLAN INTRODUCTION 
Purpose
Applicability
Scope
Assumptions
Use of this Plan

TELECOMMUNICATION PROFILE
Telecommunication Specifications
Telecommunication Requirements

PLAN ACTIVATION PROCEDURES
Plan Activation Team

TEAM MEMBERS & RESPONSIBILITIES 
Activate Team Members
Travel to Alternate Location

RECOVERY PROCEDURES
Restore Telecommunication Services

RESTORATION PROCEDURES
Original or New Site Restoration
Concurrent Processing
Plan Deactivation

APPENDIX

Appendix A: Employee Contact List
Appendix B: Vendor Contact List

We offer following risk assessment template suite along with comprehensive business continuity risk assessment templates:

Top Sellers

Package 9: Information Technologies Risk Assessment template (RA) with Data Center Recovery Templates (Click here for More Details…)

  1. Conducting a Risk Assessment Guide (15 pages)
  2. Risk Assessment Template (17 pages)
  3. Risk Assessment Worksheet (17 pages)
  4. Preventative Measures (6 pages)
  5. Example Completed Risk Assessment Template (17 pages)
  6. Example Completed Risk Assessment Worksheet (17 pages)
  7. Final Risk Assessment Executive Management Report Template w/ Charts (20 pages)
  8. Final Facility Risk Assessment Report Template w/ Charts (15 pages)
  9. Example Final Risk Assessment Executive Management Report (16 pages)
  10. Risk Analysis Policy (11 pages)
  11. Risk Analysis Standards (11 pages)
  12. Policy & Standards Instructions (3 pages)
  13. Applications and Data Criticality Analysis Template (24 pages)
  14. Example of Completed Application and Data Criticality Analysis Template (39 pages)
  15. Application Recovery Plan Template (23 pages)
  16. Application Recovery Plan Development Guide (18 pages)
  17. Database Recovery Plan Template (19 pages)
  18. Database Recovery Plan Development Guide (16 pages)
  19. Network Recovery Plan Template (20 pages)
  20. Network Recovery Plan Development Guide (15 pages)
  21. Disaster Recovery Plan Template (38 pages)
  22. Disaster Recovery Plan Development Guide (17 pages)
  23. Server Recovery Plan Template (19 pages)
  24. Server Recovery Plan Development Guide (15 pages)
  25. Telecom Recovery Plan Template (19 pages)
  26. Telecom Recovery Plan Development Guide (17 pages)

Cost: $480

Top Sellers

Package 8: Risk Assessment Template (RA) with Applications Data Analysis – Complete Package (Click here for More Details…)

  1. Conducting a Risk Assessment Guide (15 pages)
  2. Risk Assessment Template (17 pages)
  3. Risk Assessment Worksheet (17 pages)
  4. Preventative Measures (6 pages)
  5. Example Completed Risk Assessment Template (17 pages)
  6. Example Completed Risk Assessment Worksheet (17 pages)
  7. Final Risk Assessment Executive Management Report Template w/ Charts (20 pages)
  8. Final Facility Risk Assessment Report Template w/ Charts (15 pages)
  9. Example Final Risk Assessment Executive Management Report (16 pages)
  10. Risk Analysis Policy (11 pages)
  11. Risk Analysis Standards (11 pages)
  12. Policy & Standards Instructions (3 pages)
  13. Applications and Data Criticality Analysis Template (24 pages)
  14. Example of Completed Application and Data Criticality Analysis Template (39 pages)

Cost: $255

Package 1: Risk Assessment Bundle – Long Version (Click here for More Details…)

 

  1. Conducting a Risk Assessment Guide (15 pages)
  2. Risk Assessment Template (17 pages)
  3. Preventative Measures (6 pages)
  4. Example Completed Risk Assessment Template (17 pages)

Cost: $75

Package 2: Risk Assessment Bundle – Automated Version (Click here for More Details…)

  1. Conducting a Risk Assessment Guide (15 pages)
  2. Risk Assessment Worksheet (17 pages)
  3. Preventative Measures (6 pages)
  4. Example Completed Risk Assessment Worksheet (17 pages)

Cost: $90

Package 3: Risk Assessment Bundle – Both Versions (Click here for More Details…)

  1. Conducting a Risk Assessment Guide (15 pages)
  2. Risk Assessment Template (17 pages)
  3. Risk Assessment Worksheet (17 pages)
  4. Preventative Measures (6 pages)
  5. Example Completed Risk Assessment Template (17 pages)
  6. Example Completed Risk Assessment Worksheet (17 pages)

Cost: $120

Package 4: Risk Assessment Bundle – Final Reports (Click here for More Details…)

  1. Final Risk Assessment Executive Management Report Template w/ Charts (20 pages)
  2. Final Facility Risk Assessment Report Template w/ charts (15 pages)
  3. Example Final RA Executive Management Report (16 pages)

Cost: $60

Package 5: Risk Assessment Bundle – Complete package (Click here for More Details…)

  1. Conducting a Risk Assessment Guide (15 pages)
  2. Risk Assessment Template (17 pages)
  3. Risk Assessment Worksheet (17 pages)
  4. Preventative Measures (6 pages)
  5. Example Completed Risk Assessment Template (17 pages)
  6. Example Completed Risk Assessment Worksheet (17 pages)
  7. Final Risk Assessment Executive Management Report Template w/ Charts (20 pages)
  8. Final Facility Risk Assessment Report Template w/ charts (15 pages)
  9. Example Final RA Executive Management Report (16 pages)

Cost: $165

Package 6: Risk Assessment Bundle – Complete package with Policies (Click here for More Details…)

  1. Conducting a Risk Assessment Guide (15 pages)
  2. Risk Assessment Template (17 pages)
  3. Risk Assessment Worksheet (17 pages)
  4. Preventative Measures (6 pages)
  5. Example Completed Risk Assessment Template (17 pages)
  6. Example Completed Risk Assessment Worksheet (17 pages)
  7. Final Risk Assessment Executive Management Report Template w/ Charts (20 pages)
  8. Final Facility Risk Assessment Report Template w/ charts (15 pages)
  9. Example Final RA Executive Management Report (16 pages)
  10. Risk Assessment Policy (11 pages)
  11. Risk Assessment Standards (11 pages)
  12. Policy & Standards Instructions (3 pages)

Cost: $195

Package 7: Applications & Data Criticality Analysis Bundle (Click here for More Details…)

  1. Applications and Data Criticality Analysis Template (24 pages)
  2. Example of Completed Application and Data Criticality Analysis Template (39 pages)

Cost: $90

Microsoft Project Templates for Disaster Recovery and Business Continuity Planning

Package 1: Microsoft Project Templates for Enterprise Disaster Recovery and Business Continuity Planning including BIA and Risk Assessment.

Price: $99

To view a specific section of this document, please contact us at Bob@supremusgroup.com or call us at (515) 865-4591.

To buy individual template packages, visit following links: