Managing IT Risks
Once you have established an inventory of the IT assets of your enterprise, you can:
• position vulnerabilities on IT assets
• identify the risks
• position risks on IT Assets
• identify risk scenarios
• assess risks directly or via assessment campaigns
• define action plans for improvement purposes
You can also, at any time, produce reports on the management of IT risks, threats and vulnerabilities. For more details, see
"IT Risk Reports".
Describing the IT Asset Inventory and Identifying Vulnerabilities
Identifying IT Assets
For you to be able to manage risks, assets must be clearly identified and an inventory of all assets must be established and managed.
Positioning Vulnerabilities on IT Assets
You can identify vulnerabilities and position them on assets (applications and software technologies). You can use a matrix to assist you in this task.
To position vulnerabilities on IT assets:
2. Click Threats and Vulnerabilities > IT Asset Contextualization.
3. Click New.
4. Click Add Row to add vulnerabilities.
5. Click Add Column to add IT assets.
6. Click in the cells in question to connect vulnerabilities and IT assets.
Identifying and Positioning Risks
To determine the risks to which IT assets are subject, you can:
• use the vulnerabilities identified in the properties page for this asset.
• use the vulnerabilities connected to threats.
Once the risks are identified, HOPEX IT Risk Management provides two methods for positioning risks on IT assets.
Positioning Risks Using a Matrix
To position risks on IT assets, you can use a specific matrix.
To use the Risks x IT assets matrix:
1. Click on Library > Risks > Matrix > Risks per IT Asset.
2. Add:
• risks in rows
• IT assets in columns
3. Click in the cells in question to connect vulnerabilities and IT assets.
Positioning risks individually for each asset
Risks can be positioned directly on the IT assets:
• applications
• technologies
Depending on the assessment used, you can choose to position the risks on:
• applications
• applications deployed

Please note that the choice of risk positioning has an impact within the framework of risk assessment. Two different assessment models are available. See
"Risk Assessment Templates".