In Part I of this series, we covered what constitutes an interactive threat. Now that you have a handle on what an interactive threat is, how can you use this information to help you plan for them in your Integrity Management Plan (IMP)?
Risk management is a continuous process and relies on accurate and complete data. However, we all know data is never perfect, so how do we account for missing and uncertain data? Like all good processes there are a few different approaches and steps to take.