processes for vulnerability assessments and remediation • Assigning IT assets to their respective owners • Representing Vulnerability...