How Is Data Risk Calculated?
    The customized data security risk scoring framework draws inspiration from the NIST
                Cyber Risk Scoring (CRS) model to create a flexible and transparent approach to
                evaluating your organization's data security posture. Customized risk scoring offers
                a dynamic and adaptable approach to assessing your data security risk, aligning it
                with your organization's unique needs, and provides actionable recommendations for
                improving your data security posture.
Identification of Key Risk Factors—Data Risk begins by identifying critical
                attributes within three main categories: application, data, and users. These
                attributes are carefully chosen by security experts, incorporating their knowledge,
                threat intelligence, and industry insights.
Configurable Risk Factors—Administrators have the flexibility to configure the
                    
risk score ranges, 
risk factor importance, and 
data profile severity settings to align with your
                organization's specific business processes and technical requirements. 
Enterprise DLP uses these importance settings to determine the weighting
                (multiplier) for each risk attribute.
 Assessing the Likelihood of a Breach—The attributes help assess the likelihood
                of a data breach. Data Risk considers factors like application configurations, user
                behavior, and data exposure. This analysis helps in quantifying the potential
                threats an organization faces.
Evaluating the Impact of Data Breaches—Data Risk also factors in the potential
                impact of a data breach by examining data sensitivity and data profiles. This
                enables a more nuanced evaluation of the consequences of security incidents.
Aggregated Risk Score—Using these attributes and assessments, Data Risk
                calculates an aggregated risk score for all discovered assets. This score provides a
                comprehensive overview of the risk associated with sensitive data stored in SaaS
                applications.
Incorporation of SaaS App Compliance Data—Risk scoring attributes incorporate
                data related to SaaS application compliance, ensuring that regulatory and industry
                standards are part of the risk assessment.
Continuous Monitoring and Change Tracking—Use the 
Data Risk Dashboard for ongoing monitoring. It continuously
                monitors changes in data asset properties and tracks the effectiveness of
                implemented security and privacy controls. This ongoing monitoring provides insights
                into shifts in your organization's overall risk posture.
 Insights and Recommendations—Data Risk goes beyond just providing a risk score
                and offers insights into the specific security and privacy controls that
                significantly influence the risk score. It also provides 
actionable recommendations for improving the organization's security
                posture, allowing for informed decision-making and risk mitigation.