We published improvements to the information security risk management table and to the risk workflow.
Workflow for risks is now more clearly divided to the 4 main steps: identification, evaluation, treatment and monitoring.
Each step display a short instruction on what to do, and specific action buttons on the rows of the actual risks.
We will be adding some related changes to the risk documentation cards soon, that will support utilizing this renewed table even better.