• Developing effective strategies for treating identified risks
  • Case studies on successful risk treatment approaches in information security