Overview of the Risk Management Module

Modified on Wed, 28 Sep 2022 at 02:27 AM

Identify, evaluate, prioritize, manage and mitigate your risks, vulnerabilities, findings and incidents in your 1Risk platform.


The 1Risk platform integrates with vulnerability tools, including Nessus, Qualys, Nexpose and more, to feed in your vulnerabilities and remediate as appropriate. Contact your account manager or support@c1risk.com for a list of vulnerability tools for integration.


Findings are associated with Risks in the Risk Register or to Internal Controls (as Corrective Actions identified during Compliance Audit).

Incidents Management - see your Incident Management training.

Helpful Terminology


Risk, Cyber risk, or cybersecurity risk, is the potential exposure to loss or harm stemming from an organization’s people, process or technology. Cybersecurity risk severity is determined by the likelihood of exposure, critical asset impact or sensitive information loss.


Vulnerabilities are weak spots within your environment and your assets—weaknesses that open you up to potential threats and increased risk. This is where risk-based vulnerability prioritization plays a crucial role. By giving Security and IT teams the tools and insight to hone their remediation efforts on the vulnerabilities that are most likely to be exploited (and that pose the biggest risk to your business), you will not only save time, money and cycles, but you’ll improve collaboration and help lower the organization’s overall cyber risk. Aligning teams around risk means you’ll no longer be wasting resources patching vulnerabilities that don’t pose a real threat to the organization, and instead can dedicate time to more strategic activities.


Issues or Findings are existing Gaps or Events associated with your People, Process, or Technology that require evaluation, prioritization and mitigation. Where Risk is the “possibility of an event”, a Finding is the actuality, or the Gap that may cause the Risk to become an actuality. (see our Issue Management Training for more information on Findings and Mitigation).


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select atleast one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article