Watch this video on YouTube
As part of its proactive security planning, an organization intends to construct a comprehensive risk profile to underpin its security decisions. Which methodology offers the MOST insightful representation of the objectives within this risk profile?