This is a dedicated watch page for a single video.
An organization has implemented security controls to address the risks associated with employee access to sensitive data. After the controls have been in place for some time, a risk assessment is conducted to evaluate the effectiveness of these controls. What type of risk assessment is this?