Discuss the process of identifying potential threats to an information asset. How can potential threats be identified? Comment on the usefulness of using established lists for a given industry as well as interviewing experts who have experience dealing with different types of threats.
Post one original response to the discussion question(s) and reply to at least two of your colleagues. It is your responsibility to promote critical thinking and make the discussion an interactive learning experience.