Risk Management
& Threat Assessment
Identify, assess, treat, and monitor cybersecurity risks with a structured, quantitative methodology. ISO 27001 and ISO 27005 aligned — with visual dashboards, a comprehensive risk register, and full audit trails.
What is Cybersecurity Risk Management?
The Unicis Cybersecurity Risk Management module provides a structured risk register for identifying, assessing, and treating information security risks. It is aligned with ISO/IEC 27001, ISO/IEC 27005:2022, and incorporates ISO/IEC 27554:2024 for identity-related risks — giving your security team a methodology that satisfies even the most demanding auditors.
Primary Risk Formula
Both values as percentages. Best for ranking and prioritizing risks for management decisions.
Alternative Formula
For recurring incidents with historical data: malware, data entry errors, spam.
5 Risk Treatment Options
Every risk needs a treatment decision. Choose from five industry-standard options with full cost and progress tracking.
A Risk Program That Satisfies Auditors
From quantitative assessment to treatment tracking to visual dashboards — everything your ISO 27001 audit needs.
Quantitative Risk Assessment Methodology
Move beyond qualitative red/amber/green heat maps. Unicis Risk Management uses a quantitative formula based on ISO/IEC 27001 and ISO/IEC 27005:2022 — expressing both probability and impact as percentages for precise, defensible risk ratings that support management decisions.
- Primary formula: Risk = Probability (%) × Impact (%)
- Alternative formula: Risk = Threat × Vulnerability × Impact (for recurring incidents)
- Both Raw Risk Rating (pre-treatment) and Current Risk Rating (post-treatment)
- Target Risk Rating shows expected position after full control implementation
- Aligned with ISO/IEC 27001, ISO/IEC 27005:2022, and ISO/IEC 27554:2024
5 Risk Treatment Options
Every identified risk needs a treatment decision. Unicis Risk Management provides five treatment pathways aligned with industry best practices — from eliminating the risk entirely to accepting it with full documentation. Each treatment tracks cost, status, and residual risk.
- Accept — acknowledge and monitor without active mitigation
- Mitigate (Control Implementation) — apply security measures to reduce probability/impact
- Transfer — share the risk through insurance or outsourcing
- Avoid — eliminate the risk by discontinuing the activity
- Monitor — track emerging risks with defined review cycles
Comprehensive Risk Register (15+ Fields)
The Unicis Risk Register captures everything you need for a defensible, audit-ready risk management program. From initial risk description to treatment cost and implementation progress — all in a structured table that your auditors and management team will trust.
- Risk ID, Description, and Asset Owner assignment
- Raw Probability, Raw Impact, and Raw Risk Rating
- Risk Treatment selection with cost estimation
- Treatment Status (0–100% implementation progress)
- Treated Probability, Treated Impact, and Target Risk Rating
- Current Risk Rating (live, based on treatment progress)
- Notes field linked to task description and comments
Visual Risk Rating Dashboard
Your risk landscape visualized. The dashboard presents two complementary views: a Current Risk Rating chart showing where you stand today, and a Target Risk Rating matrix showing where you'll be once all controls are implemented. Color-coded for instant executive comprehension.
- Current Risk Rating chart — present risk levels based on implemented treatments
- Target Risk Rating matrix — expected risk after full control implementation
- Color formatting: green (low), amber (medium), red (high) — 0% to 100%
- Pie chart for risk distribution by treatment option
- Full audit trail for risk register changes
Available on Premium & Ultimate
Cybersecurity Risk Management is a premium feature for organizations running structured information security programs.
Premium
Full risk management for growing security teams.
- Full risk register (15+ fields)
- Quantitative risk formula
- 5 treatment options with cost tracking
- Current & Target Risk Rating dashboards
- Full audit trail
- ISO/IEC 27001 & 27005 aligned
Ultimate
Enterprise-grade with all frameworks and dedicated support.
- Everything in Premium
- NIST CSF 2.0 & SOC 2 controls
- All 8 cybersecurity frameworks
- Cross-framework mapping
- Advanced compliance reporting
- Dedicated support & SLA
Build a risk program your auditors will trust
Structured, quantitative, ISO 27001-aligned risk management — without the spreadsheet chaos.
Record of Processing Activities
Transfer Impact Assessment
Privacy Impact Assessment
Cybersecurity Controls
Interactive Awareness Program