BYOD Threat Assessment Template

1. Organization Information

2. Scope

3. Threat Identification

Threat Category Description Relevant (Yes/No) Notes
Data Leakage
Malware Infection
Unauthorized Access
Network Attacks
Loss or Theft
Others

4. Risk Assessment

Threat Likelihood Impact Existing Controls Risk Level

5. Mitigation Actions

Risk Mitigation Action Responsible Status

6. Additional Notes