What are involved in effective risk management? Identifying threat and planning for risk mitigation Protecting IT and data and planning regular maintenance, improvements, and modernization Identifying threat and planning for protection against cyber attack Assessing security status and planning for risk mitigation