We are currently making improvements to the information security risk management table and to the risk workflow.
At the same time, we will introduce the possibility to deploy asset-specific risk assessments, which will allow the organisation to direct the owners of key assets (e.g. data system, data store, provider, site) to conduct a risk assessment that will go through the most important threats associated with that asset type.
The changes will be implemented so that they do not break or render useless any work previously done in related sections.
More information coming soon. 👍