{"id":15471,"date":"2022-08-22T12:21:46","date_gmt":"2022-08-22T12:21:46","guid":{"rendered":"https:\/\/dynamics.folio3.com\/blog\/?p=15471"},"modified":"2024-05-02T10:33:43","modified_gmt":"2024-05-02T10:33:43","slug":"it-risk-management","status":"publish","type":"post","link":"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/","title":{"rendered":"What is IT Risk Management (ITRM)? Process, Examples &#038; Best Practices"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">With the adoption of your company&#8217;s digital transformation strategy, you are depending more on cloud service providers (CSPs). The business risk management program\u00a0becomes more difficult as more vendors have access to your data. It&#8217;s not even necessary for the compromised vendor to be a company you do business with. The initial step to defending yourself and your clients can be to comprehend information risk management and how to reduce these dangers. But this blog will help you understand IT risk management so it is a careful read.<\/span><\/p>\n<h2><b>What Is IT Risk Management?<\/b><\/h2>\n<p>IT risk management, also called \u201cinformation security risk management,\u201d consists of the IT risk management policy, procedures, and technologies that a company uses to mitigate threats from malicious actors and reduce information technology vulnerabilities that negatively impact data confidentiality, integrity, and availability.<\/p>\n<h2><b>What Is The Goal Or Objective Of An IT Risk Management Plan?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This business process should be used throughout the whole project, with risks being reviewed regularly to keep mitigation techniques current. Events that might have an impact on the project and steps the team could take to reduce risk should be regularly evaluated.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This risk management strategy aims to maintain constant progress and compliance with shifting internal and external limitations. It can be thought of as a continuous improvement process.\u00a0<\/span><\/p>\n<h2><b>What Are IT Risk Management Frameworks?<\/b><\/h2>\n<p>Companies utilize the IT risk management framework as a framework and a guide to recognize, remove, and reduce risks. It was initially created by the National Institute of Standards and Technology to aid in protecting the American government&#8217;s information networks.<\/p>\n<p><span style=\"font-weight: 400;\">Although the RMF was initially intended for use by federal agencies, businesses in the private sector can simply adopt it. Businesses cannot operate if they do not expose themselves to risks including IT issues, lawsuits, and financial loss. Even while it is hard to eliminate all risks associated with operating a business, they can be reduced.<\/span><\/p>\n<h2><b>What Are The Five Steps Of The IT Risk Management Lifecycle?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Referring to risk management as the risk lifecycle emphasizes the necessity for project managers to:<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><b>Identifying risks<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Once the project begins, it is critical to:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Describe the many risks that the project may encounter when it is being carried out.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Define them in light of the environment the project will be carried out. This entails extensive ideation, graphical analysis, and project history research.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><b>Assessing The Risks<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Conducting a risk assessment is the next stage after listing the risks has been completed. The objective is to evaluate the risk level, which entails categorizing risks using both quantitative and qualitative standards. This ought to enable you to classify risks (high, moderate, or low) based on their potential influence on scope, delays, or costs.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><b>Controlling Defined Risk Management\u00a0<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Risk reduction is based on control measures and thorough reaction preparation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Based on the sorted list of hazards created during the preceding phases, determine the appropriate risk response. Take into account their level of importance and urgency; some may require urgent attention, but others may be resolved in the medium or long term.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><b>Preventing Risks<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Create a procedure for tracking and keeping an eye on hazards as the project develops. This makes sure that new hazards are continually detected and managed. The risk register should be updated often for successful risk management, and the risk monitoring phase should continue even after the project is complete.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><b>Reporting Results<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Make sure to document your tracking and save your analysis as a project manager so that others can access the past. This enables you to learn from your experience and apply it to future initiatives. For stakeholders and your firm as a whole, accurate reporting is crucial.<\/span><\/p>\n<h2><b>The Best IT Risk Management Practices<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Examine the following three best practices for running your company&#8217;s IT risk management program:<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><b>Observe Your IT Environment<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Your firm can identify flaws and prioritize remedial tasks by closely monitoring its IT infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of many IT risk management examples, many organizations struggle with cloud resource configuration. &#8220;AWS S3&#8221; buckets are commonly mentioned in news reports. These public cloud storage places are not inherently dangerous, but if they are improperly configured, the public, including attackers, can access them. To improve information security, it is possible to find malfunctioning databases and storage sites by constantly monitoring your IT environment.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><b>Keep An Eye On Your Supplier Chain<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Your IT risk management approach must include third-party vendor risk reduction as well. Although you have authority over your vendors, it&#8217;s possible that you won&#8217;t be able to enforce the same legal requirements upon their vendors. You require transparency into the cybersecurity posture throughout your ecosystem as part of your comprehensive information risk management plan.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Your information is in danger, for instance, if the vendor of your supplier employs a cloud database and keeps data in plain text. The cyber health of your ecosystem can be seen by continuously checking the supply streams for encryption, a method of rendering data unintelligible even if an attacker gains access to it.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><b>Track Compliance<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Legislative governments and industry standards groups have issued stricter compliance rules as data breaches garner more news coverage. A compliance cybersecurity program must include ongoing monitoring as it is mandated by several new legislations, including the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and the New York Stop Hacks and Improve Electronic Data Security (NY SHIELD Act).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You must monitor and record your operations to give internal and external auditors confidence that your IT risk management program is compliant. You must prioritize corrective measures as you regularly <a href=\"https:\/\/dynamics.folio3.com\/blog\/business-productivity-monitoring\/\">monitor your company&#8217;s<\/a> IT ecosystem and record your progress to show your auditors that governance is in place.<\/span><\/p>\n<p><b>Conclusion \u2013 Managing risks at various stages of a project&#8217;s life<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Understanding the procedures involved in the IT risk management lifecycle is very helpful. Risk management ought to be flexible, responsive, and ongoing. It complements other crucial facets of the project, including:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Strengthen the project team by ensuring that everyone has the necessary abilities and those team members are placed with peers who complement their strengths.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regularly review risks to modify your risk control strategy,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Maintain the documentation current for the sake of transparency and to disseminate the information you&#8217;ve learned from your experience.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">You should be able to navigate the currents and succeed if you keep these last suggestions in mind as well as the steps of the IT risk management process.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the adoption of your company&#8217;s digital transformation strategy, you are depending more on cloud service providers (CSPs). The business risk management program\u00a0becomes more difficult as more vendors have access to your data. It&#8217;s not even necessary for the compromised vendor to be a company you do business with. The initial step to defending yourself [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":15545,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[57],"tags":[132],"class_list":["post-15471","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-management","tag-it-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is IT Risk Management (ITRM)? Process, Examples &amp; Best Practices<\/title>\n<meta name=\"description\" content=\"IT risk management, also called \u201cinformation security risk management,\u201d consists of the IT risk management policy, procedures, and technologies that a company uses to mitigate threats from malicious actors and reduce information technology vulnerabilities that negatively impact data confidentiality, integrity, and availability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is IT Risk Management (ITRM)? Process, Examples &amp; Best Practices\" \/>\n<meta property=\"og:description\" content=\"IT risk management, also called \u201cinformation security risk management,\u201d consists of the IT risk management policy, procedures, and technologies that a company uses to mitigate threats from malicious actors and reduce information technology vulnerabilities that negatively impact data confidentiality, integrity, and availability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Folio3 Dynamics Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-22T12:21:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-02T10:33:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dynamics.folio3.com\/blog\/wp-content\/uploads\/2022\/08\/What-is-IT-Risk-Management-ITRM_-Process-Examples-Best-Practices.png\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"491\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Danish Saud\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Danish Saud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/\"},\"author\":{\"name\":\"Danish Saud\",\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/#\/schema\/person\/3b2ae1ff089f17479f15a8c29e8db256\"},\"headline\":\"What is IT Risk Management (ITRM)? Process, Examples &#038; Best Practices\",\"datePublished\":\"2022-08-22T12:21:46+00:00\",\"dateModified\":\"2024-05-02T10:33:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/\"},\"wordCount\":1080,\"publisher\":{\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dynamics.folio3.com\/blog\/wp-content\/uploads\/2022\/08\/What-is-IT-Risk-Management-ITRM_-Process-Examples-Best-Practices.png\",\"keywords\":[\"IT Risk Management\"],\"articleSection\":[\"Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/\",\"url\":\"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/\",\"name\":\"What is IT Risk Management (ITRM)? Process, Examples & Best Practices\",\"isPartOf\":{\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dynamics.folio3.com\/blog\/wp-content\/uploads\/2022\/08\/What-is-IT-Risk-Management-ITRM_-Process-Examples-Best-Practices.png\",\"datePublished\":\"2022-08-22T12:21:46+00:00\",\"dateModified\":\"2024-05-02T10:33:43+00:00\",\"description\":\"IT risk management, also called \u201cinformation security risk management,\u201d consists of the IT risk management policy, procedures, and technologies that a company uses to mitigate threats from malicious actors and reduce information technology vulnerabilities that negatively impact data confidentiality, integrity, and availability.\",\"breadcrumb\":{\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/#primaryimage\",\"url\":\"https:\/\/dynamics.folio3.com\/blog\/wp-content\/uploads\/2022\/08\/What-is-IT-Risk-Management-ITRM_-Process-Examples-Best-Practices.png\",\"contentUrl\":\"https:\/\/dynamics.folio3.com\/blog\/wp-content\/uploads\/2022\/08\/What-is-IT-Risk-Management-ITRM_-Process-Examples-Best-Practices.png\",\"width\":960,\"height\":491,\"caption\":\"it risk management\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/dynamics.folio3.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is IT Risk Management (ITRM)? Process, Examples &#038; Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/#website\",\"url\":\"https:\/\/dynamics.folio3.com\/blog\/\",\"name\":\"Folio3 Dynamics Blog\",\"description\":\"News, Guides and Info from the world of Microsoft Dynamics\",\"publisher\":{\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dynamics.folio3.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/#organization\",\"name\":\"Folio3\",\"url\":\"https:\/\/dynamics.folio3.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dynamics.folio3.com\/blog\/wp-content\/uploads\/2022\/01\/footer-logo.png\",\"contentUrl\":\"https:\/\/dynamics.folio3.com\/blog\/wp-content\/uploads\/2022\/01\/footer-logo.png\",\"width\":154,\"height\":100,\"caption\":\"Folio3\"},\"image\":{\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/#\/schema\/person\/3b2ae1ff089f17479f15a8c29e8db256\",\"name\":\"Danish Saud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dynamics.folio3.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1aa1d1e7bf8002767378c4cd4c8f8b2e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1aa1d1e7bf8002767378c4cd4c8f8b2e?s=96&d=mm&r=g\",\"caption\":\"Danish Saud\"},\"url\":\"https:\/\/dynamics.folio3.com\/blog\/author\/danishsaud\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is IT Risk Management (ITRM)? Process, Examples & Best Practices","description":"IT risk management, also called \u201cinformation security risk management,\u201d consists of the IT risk management policy, procedures, and technologies that a company uses to mitigate threats from malicious actors and reduce information technology vulnerabilities that negatively impact data confidentiality, integrity, and availability.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/","og_locale":"en_US","og_type":"article","og_title":"What is IT Risk Management (ITRM)? Process, Examples & Best Practices","og_description":"IT risk management, also called \u201cinformation security risk management,\u201d consists of the IT risk management policy, procedures, and technologies that a company uses to mitigate threats from malicious actors and reduce information technology vulnerabilities that negatively impact data confidentiality, integrity, and availability.","og_url":"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/","og_site_name":"Folio3 Dynamics Blog","article_published_time":"2022-08-22T12:21:46+00:00","article_modified_time":"2024-05-02T10:33:43+00:00","og_image":[{"width":960,"height":491,"url":"https:\/\/dynamics.folio3.com\/blog\/wp-content\/uploads\/2022\/08\/What-is-IT-Risk-Management-ITRM_-Process-Examples-Best-Practices.png","type":"image\/png"}],"author":"Danish Saud","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Danish Saud","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/#article","isPartOf":{"@id":"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/"},"author":{"name":"Danish Saud","@id":"https:\/\/dynamics.folio3.com\/blog\/#\/schema\/person\/3b2ae1ff089f17479f15a8c29e8db256"},"headline":"What is IT Risk Management (ITRM)? Process, Examples &#038; Best Practices","datePublished":"2022-08-22T12:21:46+00:00","dateModified":"2024-05-02T10:33:43+00:00","mainEntityOfPage":{"@id":"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/"},"wordCount":1080,"publisher":{"@id":"https:\/\/dynamics.folio3.com\/blog\/#organization"},"image":{"@id":"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/dynamics.folio3.com\/blog\/wp-content\/uploads\/2022\/08\/What-is-IT-Risk-Management-ITRM_-Process-Examples-Best-Practices.png","keywords":["IT Risk Management"],"articleSection":["Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/","url":"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/","name":"What is IT Risk Management (ITRM)? Process, Examples & Best Practices","isPartOf":{"@id":"https:\/\/dynamics.folio3.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/#primaryimage"},"image":{"@id":"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/dynamics.folio3.com\/blog\/wp-content\/uploads\/2022\/08\/What-is-IT-Risk-Management-ITRM_-Process-Examples-Best-Practices.png","datePublished":"2022-08-22T12:21:46+00:00","dateModified":"2024-05-02T10:33:43+00:00","description":"IT risk management, also called \u201cinformation security risk management,\u201d consists of the IT risk management policy, procedures, and technologies that a company uses to mitigate threats from malicious actors and reduce information technology vulnerabilities that negatively impact data confidentiality, integrity, and availability.","breadcrumb":{"@id":"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/#primaryimage","url":"https:\/\/dynamics.folio3.com\/blog\/wp-content\/uploads\/2022\/08\/What-is-IT-Risk-Management-ITRM_-Process-Examples-Best-Practices.png","contentUrl":"https:\/\/dynamics.folio3.com\/blog\/wp-content\/uploads\/2022\/08\/What-is-IT-Risk-Management-ITRM_-Process-Examples-Best-Practices.png","width":960,"height":491,"caption":"it risk management"},{"@type":"BreadcrumbList","@id":"https:\/\/dynamics.folio3.com\/blog\/it-risk-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/dynamics.folio3.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is IT Risk Management (ITRM)? Process, Examples &#038; Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/dynamics.folio3.com\/blog\/#website","url":"https:\/\/dynamics.folio3.com\/blog\/","name":"Folio3 Dynamics Blog","description":"News, Guides and Info from the world of Microsoft Dynamics","publisher":{"@id":"https:\/\/dynamics.folio3.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dynamics.folio3.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dynamics.folio3.com\/blog\/#organization","name":"Folio3","url":"https:\/\/dynamics.folio3.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dynamics.folio3.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/dynamics.folio3.com\/blog\/wp-content\/uploads\/2022\/01\/footer-logo.png","contentUrl":"https:\/\/dynamics.folio3.com\/blog\/wp-content\/uploads\/2022\/01\/footer-logo.png","width":154,"height":100,"caption":"Folio3"},"image":{"@id":"https:\/\/dynamics.folio3.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dynamics.folio3.com\/blog\/#\/schema\/person\/3b2ae1ff089f17479f15a8c29e8db256","name":"Danish Saud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dynamics.folio3.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1aa1d1e7bf8002767378c4cd4c8f8b2e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1aa1d1e7bf8002767378c4cd4c8f8b2e?s=96&d=mm&r=g","caption":"Danish Saud"},"url":"https:\/\/dynamics.folio3.com\/blog\/author\/danishsaud\/"}]}},"_links":{"self":[{"href":"https:\/\/dynamics.folio3.com\/blog\/wp-json\/wp\/v2\/posts\/15471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dynamics.folio3.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dynamics.folio3.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dynamics.folio3.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/dynamics.folio3.com\/blog\/wp-json\/wp\/v2\/comments?post=15471"}],"version-history":[{"count":0,"href":"https:\/\/dynamics.folio3.com\/blog\/wp-json\/wp\/v2\/posts\/15471\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dynamics.folio3.com\/blog\/wp-json\/wp\/v2\/media\/15545"}],"wp:attachment":[{"href":"https:\/\/dynamics.folio3.com\/blog\/wp-json\/wp\/v2\/media?parent=15471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dynamics.folio3.com\/blog\/wp-json\/wp\/v2\/categories?post=15471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dynamics.folio3.com\/blog\/wp-json\/wp\/v2\/tags?post=15471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}